On the security of TLS and IPsec : Mitigation through physical constraints
TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilit...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Institutionen för datavetenskap
2015
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357 |
id |
ndltd-UPSALLA1-oai-DiVA.org-liu-119357 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-liu-1193572018-01-12T05:11:03ZOn the security of TLS and IPsec : Mitigation through physical constraintsengOm säkerheten hos TLS och IPsec : Lindring genom fysiska begränsningarReimers, ErikLinköpings universitet, Institutionen för datavetenskapLinköpings universitet, Tekniska fakulteten2015TLSTransport Layer SecurityIPsecvulnerabilitiesattacksComputer SciencesDatavetenskap (datalogi)TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. Based on the vulnerabilities this paper gives guidelines onhow to avoid them when implementing TLS and IPsec. This paper also demonstrates a proof-of-concept that shows how IPsec can be configured to avoid some of the vulnerabilities. Theproof-of-concept also shows how IPsec can be used to setup a secure connection between two peers, using Near Field Communication, on an ad hoc network. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
TLS Transport Layer Security IPsec vulnerabilities attacks Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
TLS Transport Layer Security IPsec vulnerabilities attacks Computer Sciences Datavetenskap (datalogi) Reimers, Erik On the security of TLS and IPsec : Mitigation through physical constraints |
description |
TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. Based on the vulnerabilities this paper gives guidelines onhow to avoid them when implementing TLS and IPsec. This paper also demonstrates a proof-of-concept that shows how IPsec can be configured to avoid some of the vulnerabilities. Theproof-of-concept also shows how IPsec can be used to setup a secure connection between two peers, using Near Field Communication, on an ad hoc network. |
author |
Reimers, Erik |
author_facet |
Reimers, Erik |
author_sort |
Reimers, Erik |
title |
On the security of TLS and IPsec : Mitigation through physical constraints |
title_short |
On the security of TLS and IPsec : Mitigation through physical constraints |
title_full |
On the security of TLS and IPsec : Mitigation through physical constraints |
title_fullStr |
On the security of TLS and IPsec : Mitigation through physical constraints |
title_full_unstemmed |
On the security of TLS and IPsec : Mitigation through physical constraints |
title_sort |
on the security of tls and ipsec : mitigation through physical constraints |
publisher |
Linköpings universitet, Institutionen för datavetenskap |
publishDate |
2015 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357 |
work_keys_str_mv |
AT reimerserik onthesecurityoftlsandipsecmitigationthroughphysicalconstraints AT reimerserik omsakerhetenhostlsochipseclindringgenomfysiskabegransningar |
_version_ |
1718605910569385984 |