IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2010-11-18 09:30
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols -- A Countermeasure against Compromising of Cryptosystems in SSL --
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39
Abstract (in Japanese) (See Japanese page) 
(in English) Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in security protocols are reduced in strength because of an enhancement in the computation power or a new method for decryption. It is called the cryptography compromising problem. It is important for the service providers which use cryptographic communications to take care this problem in order to preserve the security and the connectivity.
In this paper, we discuss about the cryptography compromising problem from the point of view of the service providers. Based on this discussion, we propose that a method to check cryptographic algorithms in security protocols. We focus on the negotiation between the server and the client to extract the cryptographic algorithms used in the security protocol. In addition, we mention a countermeasure against compromising of cryptosystems in SSL by using this method and a compromising list.
Keyword (in Japanese) (See Japanese page) 
(in English) Compromising of Cryptosystems / Security Protocols / SSL / Cipher Suites / / / /  
Reference Info. IEICE Tech. Rep., vol. 110, no. 282, LOIS2010-39, pp. 73-80, Nov. 2010.
Paper # LOIS2010-39 
Date of Issue 2010-11-10 (ISEC, LOIS) 
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF ISEC2010-60 LOIS2010-39

Conference Information
Committee ISEC LOIS  
Conference Date 2010-11-17 - 2010-11-18 
Place (in Japanese) (See Japanese page) 
Place (in English) Tsukuba Univ. 
Topics (in Japanese) (See Japanese page) 
Topics (in English)  
Paper Information
Registration To LOIS 
Conference Code 2010-11-ISEC-LOIS 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) A Proposal of a method to Check Cryptographic Algorithms in Security Protocols 
Sub Title (in English) A Countermeasure against Compromising of Cryptosystems in SSL 
Keyword(1) Compromising of Cryptosystems  
Keyword(2) Security Protocols  
Keyword(3) SSL  
Keyword(4) Cipher Suites  
Keyword(5)  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Ryota Sato  
1st Author's Affiliation NTT information sharing platform laboratories (NTT)
2nd Author's Name Yoshiaki Seki  
2nd Author's Affiliation NTT information sharing platform laboratories (NTT)
3rd Author's Name Katsuhiko Yoshida  
3rd Author's Affiliation NTT information sharing platform laboratories (NTT)
4th Author's Name Shigeru Kayaguchi  
4th Author's Affiliation NTT information sharing platform laboratories (NTT)
5th Author's Name Shinichi Hirata  
5th Author's Affiliation NTT information sharing platform laboratories (NTT)
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker
Date Time 2010-11-18 09:30:00 
Presentation Time 30 
Registration for LOIS 
Paper # IEICE-ISEC2010-60,IEICE-LOIS2010-39 
Volume (vol) IEICE-110 
Number (no) no.281(ISEC), no.282(LOIS) 
Page pp.73-80 
#Pages IEICE-8 
Date of Issue IEICE-ISEC-2010-11-10,IEICE-LOIS-2010-11-10 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan