Encryption Algorithm for TCP Session Hijacking

by   Minghan Chen, et al.

Distributed network of the computer and the design defects of the TCP protocol are given to the network attack to be multiplicative. Based on the simple and open assumptions of the TCP protocol in academic and collaborative communication environments, the protocol lacks secure authentication. In this paper, by adding RSA-based cryptography technology, RSA-based signature technology, DH key exchange algorithm, and HAMC-SHA1 integrity verification technology to the TCP protocol, and propose a security strategy which can effectively defend against TCP session hijacking.


page 1

page 2

page 3

page 4


An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

Wide-spread use of wireless sensor networks (WSNs) that are consisted of...

AfricaOS: Using a distributed, proposal-based, replicated state machine towards liberation from the Berlin Conference of 1885

The Berlin Conference of 1885 has influenced the way native Africans, an...

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

Avionics networks rely on a set of stringent reliability and safety requ...

Inductive Analysis of the Internet Protocol TLS

Internet browsers use security protocols to protect sensitive messages. ...

Security analysis of a blockchain-based protocol for the certification of academic credentials

We consider a blockchain-based protocol for the certification of academi...

Analysing and Patching SPEKE in ISO/IEC

Simple Password Exponential Key Exchange (SPEKE) is a well-known Passwor...