Loading…

Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS

The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this p...

Full description

Saved in:
Bibliographic Details
Published in:中国通信 2013 (7), p.85-92
Main Author: XIAO Yuelei WANG Yumin PANG Liaoj un
Format: Article
Language:Chinese
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 92
container_issue 7
container_start_page 85
container_title 中国通信
container_volume
creator XIAO Yuelei WANG Yumin PANG Liaoj un
description The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.
format article
fullrecord <record><control><sourceid>chongqing</sourceid><recordid>TN_cdi_chongqing_primary_46703835</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>46703835</cqvip_id><sourcerecordid>46703835</sourcerecordid><originalsourceid>FETCH-chongqing_primary_467038353</originalsourceid><addsrcrecordid>eNqNysEKgjAYAOAdCpLyHf4eQLD-qXksURIiAneXpdMGutm2At--Dj1Ap-_yLYi3ixMMIkqTFfGtlfdwH2KUYooeySvRvIx0MxwVH2YrLXDVQjlORr_FKJQD3QG7ZlAWAYOb0U43eoCTVK1UPTgN7FJtyLLjgxX-zzXZFjnLzkHz0Kp_fmM9GTlyM9c0TkI8YIT_nA8ejTiF</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</title><source>IEEE Electronic Library (IEL) Journals</source><creator>XIAO Yuelei WANG Yumin PANG Liaoj un</creator><creatorcontrib>XIAO Yuelei WANG Yumin PANG Liaoj un</creatorcontrib><description>The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.</description><identifier>ISSN: 1673-5447</identifier><language>chi</language><subject>SSM ; TLS ; 中间人攻击 ; 串空间模型 ; 安全协议 ; 安全性分析 ; 绑定 ; 跨国公司</subject><ispartof>中国通信, 2013 (7), p.85-92</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/89450X/89450X.jpg</thumbnail><link.rule.ids>314,780,784,4022</link.rule.ids></links><search><creatorcontrib>XIAO Yuelei WANG Yumin PANG Liaoj un</creatorcontrib><title>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</title><title>中国通信</title><addtitle>China Communications</addtitle><description>The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.</description><subject>SSM</subject><subject>TLS</subject><subject>中间人攻击</subject><subject>串空间模型</subject><subject>安全协议</subject><subject>安全性分析</subject><subject>绑定</subject><subject>跨国公司</subject><issn>1673-5447</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNqNysEKgjAYAOAdCpLyHf4eQLD-qXksURIiAneXpdMGutm2At--Dj1Ap-_yLYi3ixMMIkqTFfGtlfdwH2KUYooeySvRvIx0MxwVH2YrLXDVQjlORr_FKJQD3QG7ZlAWAYOb0U43eoCTVK1UPTgN7FJtyLLjgxX-zzXZFjnLzkHz0Kp_fmM9GTlyM9c0TkI8YIT_nA8ejTiF</recordid><startdate>2013</startdate><enddate>2013</enddate><creator>XIAO Yuelei WANG Yumin PANG Liaoj un</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope></search><sort><creationdate>2013</creationdate><title>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</title><author>XIAO Yuelei WANG Yumin PANG Liaoj un</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-chongqing_primary_467038353</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>chi</language><creationdate>2013</creationdate><topic>SSM</topic><topic>TLS</topic><topic>中间人攻击</topic><topic>串空间模型</topic><topic>安全协议</topic><topic>安全性分析</topic><topic>绑定</topic><topic>跨国公司</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>XIAO Yuelei WANG Yumin PANG Liaoj un</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><jtitle>中国通信</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>XIAO Yuelei WANG Yumin PANG Liaoj un</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS</atitle><jtitle>中国通信</jtitle><addtitle>China Communications</addtitle><date>2013</date><risdate>2013</risdate><issue>7</issue><spage>85</spage><epage>92</epage><pages>85-92</pages><issn>1673-5447</issn><abstract>The TNC IF-T Protocol Binding to TLS (TIPBT) is specified by Trusted Computing Group (TCG) for TNC assessment exchanges. However, the TIPBT cannot be ana- lysed by current Strand Space Model (SSM) because of the different requirements from the traditional security protocols. In order to solve this problem, first, we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle (MITM) attacks in some cases based on the extended SSM. Then, we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.</abstract></addata></record>
fulltext fulltext
identifier ISSN: 1673-5447
ispartof 中国通信, 2013 (7), p.85-92
issn 1673-5447
language chi
recordid cdi_chongqing_primary_46703835
source IEEE Electronic Library (IEL) Journals
subjects SSM
TLS
中间人攻击
串空间模型
安全协议
安全性分析
绑定
跨国公司
title Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T20%3A37%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-chongqing&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Analysis%20and%20Improvement%20of%20TNC%20IF-T%20Protocol%20Binding%20to%20TLS&rft.jtitle=%E4%B8%AD%E5%9B%BD%E9%80%9A%E4%BF%A1&rft.au=XIAO%20Yuelei%20WANG%20Yumin%20PANG%20Liaoj%20un&rft.date=2013&rft.issue=7&rft.spage=85&rft.epage=92&rft.pages=85-92&rft.issn=1673-5447&rft_id=info:doi/&rft_dat=%3Cchongqing%3E46703835%3C/chongqing%3E%3Cgrp_id%3Ecdi_FETCH-chongqing_primary_467038353%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=46703835&rfr_iscdi=true