作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2006, Vol. 32 ›› Issue (10): 123-124,127.

• 安全技术 • 上一篇    下一篇

TLS 协议组密底泄露缺陷及改进

徐 强,司天歌,戴一奇   

  1. 清华大学计算机科学与技术系,北京 100084
  • 出版日期:2006-05-20 发布日期:2006-05-20

Weakness and Improvement of Encrypted Messages Guessed in TLS Protocol Group

XU Qiang, SI Tiange, DAI Yiqi   

  1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084
  • Online:2006-05-20 Published:2006-05-20

摘要: 提出了TLS 协议组(SSL 3.0 和TLS 1.0 及其衍生的系列协议)共同存在的一个安全缺陷:密文的最前面4 个字节其底码是可以猜测的。攻击者利用该缺陷蛮力搜索密钥攻击该类协议时可以大幅度减少工程量。给出了协议改进方案;针对改进前后的协议,详细描述了蛮力攻击方法,并进行了攻击复杂度分析。

关键词: TLS 协议组;SSL;TLS;流密码;分组密码

Abstract: This paper at first introduces a security weakness which the first four encrypted bytes can be guessed in TLS protocol group. Using it the computational amount of a brute force attack on these protocols may be greatly reduced. This paper proposes a modification to conquer this weakness and elaborates the brute force attack method and its computational complexity

Key words: TLS protocol group; Secure socket layer (SSL); Transport layer security (TLS); Stream cipher; Block cipher