Demonstration of attacks on SSL-TLS protocols

Secure Sockets Layer (SSL) which was superseded by Transport Layer Security (TLS) is the most extensively used application of cryptography in the day-to-day life of humanity. It is used to secure communication between two parties across the internet ensuring the principles of identification, authent...

全面介紹

Saved in:
書目詳細資料
主要作者: Iyer Rajagopal Mahadevan
其他作者: Tay Kian Boon
格式: Final Year Project
語言:English
出版: Nanyang Technological University 2022
主題:
在線閱讀:https://hdl.handle.net/10356/156548
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
id sg-ntu-dr.10356-156548
record_format dspace
spelling sg-ntu-dr.10356-1565482022-04-20T00:34:54Z Demonstration of attacks on SSL-TLS protocols Iyer Rajagopal Mahadevan Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography Secure Sockets Layer (SSL) which was superseded by Transport Layer Security (TLS) is the most extensively used application of cryptography in the day-to-day life of humanity. It is used to secure communication between two parties across the internet ensuring the principles of identification, authentication, confidentiality, and integrity. Over the last decade there have been multiple attacks on SSL-TLS in order to break the encryption and obtain the sensitive information that was encrypted. Some of these attacks focus on implementation errors, or some inherent feature of SSL-TLS. This report shall focus on two such attacks, POODLE and CRIME and we will dive deep into following aspects: 1. Feature of SSL-TLS that is exploited. 2. How is it exploited (Theory)? 3. How is it exploited (Proof-of-Concept)? 4. What is the impact of this attack? 5. What are some strategies to mitigate this attack? Bachelor of Engineering (Computer Science) 2022-04-20T00:34:54Z 2022-04-20T00:34:54Z 2022 Final Year Project (FYP) Iyer Rajagopal Mahadevan (2022). Demonstration of attacks on SSL-TLS protocols. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156548 https://hdl.handle.net/10356/156548 en SCSE21-0442 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle Science::Mathematics::Discrete mathematics::Cryptography
Iyer Rajagopal Mahadevan
Demonstration of attacks on SSL-TLS protocols
description Secure Sockets Layer (SSL) which was superseded by Transport Layer Security (TLS) is the most extensively used application of cryptography in the day-to-day life of humanity. It is used to secure communication between two parties across the internet ensuring the principles of identification, authentication, confidentiality, and integrity. Over the last decade there have been multiple attacks on SSL-TLS in order to break the encryption and obtain the sensitive information that was encrypted. Some of these attacks focus on implementation errors, or some inherent feature of SSL-TLS. This report shall focus on two such attacks, POODLE and CRIME and we will dive deep into following aspects: 1. Feature of SSL-TLS that is exploited. 2. How is it exploited (Theory)? 3. How is it exploited (Proof-of-Concept)? 4. What is the impact of this attack? 5. What are some strategies to mitigate this attack?
author2 Tay Kian Boon
author_facet Tay Kian Boon
Iyer Rajagopal Mahadevan
format Final Year Project
author Iyer Rajagopal Mahadevan
author_sort Iyer Rajagopal Mahadevan
title Demonstration of attacks on SSL-TLS protocols
title_short Demonstration of attacks on SSL-TLS protocols
title_full Demonstration of attacks on SSL-TLS protocols
title_fullStr Demonstration of attacks on SSL-TLS protocols
title_full_unstemmed Demonstration of attacks on SSL-TLS protocols
title_sort demonstration of attacks on ssl-tls protocols
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/156548
_version_ 1731235804477390848