Encryption Algorithm for TCP Session Hijacking

02/04/2020
by   Minghan Chen, et al.
0

Distributed network of the computer and the design defects of the TCP protocol are given to the network attack to be multiplicative. Based on the simple and open assumptions of the TCP protocol in academic and collaborative communication environments, the protocol lacks secure authentication. In this paper, by adding RSA-based cryptography technology, RSA-based signature technology, DH key exchange algorithm, and HAMC-SHA1 integrity verification technology to the TCP protocol, and propose a security strategy which can effectively defend against TCP session hijacking.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/24/2023

An Efficient Key Management Scheme For In-Vehicle Network

Vehicle technology has developed rapidly these years, however, the secur...
research
03/23/2020

AfricaOS: Using a distributed, proposal-based, replicated state machine towards liberation from the Berlin Conference of 1885

The Berlin Conference of 1885 has influenced the way native Africans, an...
research
07/12/2023

Benchmarking the Security Protocol and Data Model (SPDM) for component authentication

Efforts to secure computing systems via software traditionally focus on ...
research
08/14/2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

Avionics networks rely on a set of stringent reliability and safety requ...
research
07/17/2019

Inductive Analysis of the Internet Protocol TLS

Internet browsers use security protocols to protect sensitive messages. ...
research
03/16/2020

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...
research
03/31/2019

How to Authenticate MQTT Sessions Without Channel- and Broker Security

This paper describes a new but state-of-the-art approach to provide auth...

Please sign up or login with your details

Forgot password? Click here to reset