Encryption Algorithm for TCP Session Hijacking

02/04/2020
by   Minghan Chen, et al.
0

Distributed network of the computer and the design defects of the TCP protocol are given to the network attack to be multiplicative. Based on the simple and open assumptions of the TCP protocol in academic and collaborative communication environments, the protocol lacks secure authentication. In this paper, by adding RSA-based cryptography technology, RSA-based signature technology, DH key exchange algorithm, and HAMC-SHA1 integrity verification technology to the TCP protocol, and propose a security strategy which can effectively defend against TCP session hijacking.

READ FULL TEXT

page 1

page 2

page 3

page 4

09/23/2021

An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

Wide-spread use of wireless sensor networks (WSNs) that are consisted of...
03/23/2020

AfricaOS: Using a distributed, proposal-based, replicated state machine towards liberation from the Berlin Conference of 1885

The Berlin Conference of 1885 has influenced the way native Africans, an...
03/16/2020

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...
08/14/2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

Avionics networks rely on a set of stringent reliability and safety requ...
07/17/2019

Inductive Analysis of the Internet Protocol TLS

Internet browsers use security protocols to protect sensitive messages. ...
10/10/2019

Security analysis of a blockchain-based protocol for the certification of academic credentials

We consider a blockchain-based protocol for the certification of academi...
02/14/2018

Analysing and Patching SPEKE in ISO/IEC

Simple Password Exponential Key Exchange (SPEKE) is a well-known Passwor...