TLS Protocol: Secure Protocol With Client Puzzles
Journal Title: Acta Technica Napocensis- Electronica-Telecomunicatii (Electronics and Telecommunications) - Year 2010, Vol 51, Issue 2
Abstract
Client puzzles are commonly proposed as a solution to denial-of-service attacks. We analyzed the TLS protocol and implement Client Puzzles algorithm. We pursued the following objectives: analyze TLS handshake protocol and implement Client Puzzles algorithm using Hash Functions, Diffie-Hellman Base Puzzle Scheme and Threshold Puzzles. The originality of the paper is due to a comparative study of methods used to create the Client Puzzle solution. We also present measurements of execution time when our modified protocol is under attack.
Authors and Affiliations
Raluca CATARGIU, Monica BORDA
A Study of the Permutation Schemes Used in the Mobile WIMAX
With the goal of decreasing the interference at sub-carrier level, the allocation of sub-carrier frequencies in an OFDMA based system is selective. This selective allocation can be seen like a permutation of a frequency...
A Novel End-To-End QoS Framework Over Heterogeneous Networks - An Architectural Approach
End-to-end QoS (Quality of Service) provisioning over heterogeneous networks is a major challenge. The poor communication between Service Providers, the increasing complexity of the supported services, the need for fulfi...
Feedback Control vs. Integrated Control. A Case Study: Variable Volume Room Experimental Benchmark
Systems are in continuous diversification of their application domains and functioning specification requirements. Now, control systems’ development is mainly oriented towards completing of conventional feedback control...
Camera Phone Based Barcode Decoding System
We propose a 1D barcode acquisition and decoding system based on the use of J2ME enabled mobile phones. The approach relies on image processing techniques to correct the distortions introduces by the acquisition device,...
Retrieving Call Detail Records from Asterisk using SNMP
Several SNMP agents could be integrated by IETF’s AgentX protocol which separates the communication with SNMP manager in two parts: AgentX between sub-agents and master agent, and SNMP between master agent and manager. T...