Loading…
Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS
The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this p...
Saved in:
Published in: | 中国通信 2013 (7), p.85-92 |
---|---|
Main Author: | |
Format: | Article |
Language: | Chinese |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 92 |
container_issue | 7 |
container_start_page | 85 |
container_title | 中国通信 |
container_volume | |
creator | XIAO Yuelei WANG Yumin PANG Liaoj un |
description | The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM. |
format | article |
fullrecord | <record><control><sourceid>chongqing</sourceid><recordid>TN_cdi_chongqing_primary_46703835</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>46703835</cqvip_id><sourcerecordid>46703835</sourcerecordid><originalsourceid>FETCH-chongqing_primary_467038353</originalsourceid><addsrcrecordid>eNqNysEKgjAYAOAdCpLyHf4eQLD-qXksURIiAneXpdMGutm2At--Dj1Ap-_yLYi3ixMMIkqTFfGtlfdwH2KUYooeySvRvIx0MxwVH2YrLXDVQjlORr_FKJQD3QG7ZlAWAYOb0U43eoCTVK1UPTgN7FJtyLLjgxX-zzXZFjnLzkHz0Kp_fmM9GTlyM9c0TkI8YIT_nA8ejTiF</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</title><source>IEEE Electronic Library (IEL) Journals</source><creator>XIAO Yuelei WANG Yumin PANG Liaoj un</creator><creatorcontrib>XIAO Yuelei WANG Yumin PANG Liaoj un</creatorcontrib><description>The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.</description><identifier>ISSN: 1673-5447</identifier><language>chi</language><subject>SSM ; TLS ; 中间人攻击 ; 串空间模型 ; 安全协议 ; 安全性分析 ; 绑定 ; 跨国公司</subject><ispartof>中国通信, 2013 (7), p.85-92</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/89450X/89450X.jpg</thumbnail><link.rule.ids>314,780,784,4022</link.rule.ids></links><search><creatorcontrib>XIAO Yuelei WANG Yumin PANG Liaoj un</creatorcontrib><title>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</title><title>中国通信</title><addtitle>China Communications</addtitle><description>The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.</description><subject>SSM</subject><subject>TLS</subject><subject>中间人攻击</subject><subject>串空间模型</subject><subject>安全协议</subject><subject>安全性分析</subject><subject>绑定</subject><subject>跨国公司</subject><issn>1673-5447</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNqNysEKgjAYAOAdCpLyHf4eQLD-qXksURIiAneXpdMGutm2At--Dj1Ap-_yLYi3ixMMIkqTFfGtlfdwH2KUYooeySvRvIx0MxwVH2YrLXDVQjlORr_FKJQD3QG7ZlAWAYOb0U43eoCTVK1UPTgN7FJtyLLjgxX-zzXZFjnLzkHz0Kp_fmM9GTlyM9c0TkI8YIT_nA8ejTiF</recordid><startdate>2013</startdate><enddate>2013</enddate><creator>XIAO Yuelei WANG Yumin PANG Liaoj un</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope></search><sort><creationdate>2013</creationdate><title>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</title><author>XIAO Yuelei WANG Yumin PANG Liaoj un</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-chongqing_primary_467038353</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>chi</language><creationdate>2013</creationdate><topic>SSM</topic><topic>TLS</topic><topic>中间人攻击</topic><topic>串空间模型</topic><topic>安全协议</topic><topic>安全性分析</topic><topic>绑定</topic><topic>跨国公司</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>XIAO Yuelei WANG Yumin PANG Liaoj un</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><jtitle>中国通信</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>XIAO Yuelei WANG Yumin PANG Liaoj un</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</atitle><jtitle>中国通信</jtitle><addtitle>China Communications</addtitle><date>2013</date><risdate>2013</risdate><issue>7</issue><spage>85</spage><epage>92</epage><pages>85-92</pages><issn>1673-5447</issn><abstract>The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.</abstract></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1673-5447 |
ispartof | 中国通信, 2013 (7), p.85-92 |
issn | 1673-5447 |
language | chi |
recordid | cdi_chongqing_primary_46703835 |
source | IEEE Electronic Library (IEL) Journals |
subjects | SSM TLS 中间人攻击 串空间模型 安全协议 安全性分析 绑定 跨国公司 |
title | Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T20%3A37%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-chongqing&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Analysis%20and%20Improvement%20of%20TNC%20IF-T%20Protocol%20Binding%20to%20TLS&rft.jtitle=%E4%B8%AD%E5%9B%BD%E9%80%9A%E4%BF%A1&rft.au=XIAO%20Yuelei%20WANG%20Yumin%20PANG%20Liaoj%20un&rft.date=2013&rft.issue=7&rft.spage=85&rft.epage=92&rft.pages=85-92&rft.issn=1673-5447&rft_id=info:doi/&rft_dat=%3Cchongqing%3E46703835%3C/chongqing%3E%3Cgrp_id%3Ecdi_FETCH-chongqing_primary_467038353%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=46703835&rfr_iscdi=true |