On the security of TLS and IPsec : Mitigation through physical constraints

TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilit...

Full description

Bibliographic Details
Main Author: Reimers, Erik
Format: Others
Language:English
Published: Linköpings universitet, Institutionen för datavetenskap 2015
Subjects:
TLS
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357
id ndltd-UPSALLA1-oai-DiVA.org-liu-119357
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-liu-1193572018-01-12T05:11:03ZOn the security of TLS and IPsec : Mitigation through physical constraintsengOm säkerheten hos TLS och IPsec : Lindring genom fysiska begränsningarReimers, ErikLinköpings universitet, Institutionen för datavetenskapLinköpings universitet, Tekniska fakulteten2015TLSTransport Layer SecurityIPsecvulnerabilitiesattacksComputer SciencesDatavetenskap (datalogi)TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. Based on the vulnerabilities this paper gives guidelines onhow to avoid them when implementing TLS and IPsec. This paper also demonstrates a proof-of-concept that shows how IPsec can be configured to avoid some of the vulnerabilities. Theproof-of-concept also shows how IPsec can be used to setup a secure connection between two peers, using Near Field Communication, on an ad hoc network. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic TLS
Transport Layer Security
IPsec
vulnerabilities
attacks
Computer Sciences
Datavetenskap (datalogi)
spellingShingle TLS
Transport Layer Security
IPsec
vulnerabilities
attacks
Computer Sciences
Datavetenskap (datalogi)
Reimers, Erik
On the security of TLS and IPsec : Mitigation through physical constraints
description TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. Based on the vulnerabilities this paper gives guidelines onhow to avoid them when implementing TLS and IPsec. This paper also demonstrates a proof-of-concept that shows how IPsec can be configured to avoid some of the vulnerabilities. Theproof-of-concept also shows how IPsec can be used to setup a secure connection between two peers, using Near Field Communication, on an ad hoc network.
author Reimers, Erik
author_facet Reimers, Erik
author_sort Reimers, Erik
title On the security of TLS and IPsec : Mitigation through physical constraints
title_short On the security of TLS and IPsec : Mitigation through physical constraints
title_full On the security of TLS and IPsec : Mitigation through physical constraints
title_fullStr On the security of TLS and IPsec : Mitigation through physical constraints
title_full_unstemmed On the security of TLS and IPsec : Mitigation through physical constraints
title_sort on the security of tls and ipsec : mitigation through physical constraints
publisher Linköpings universitet, Institutionen för datavetenskap
publishDate 2015
url http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357
work_keys_str_mv AT reimerserik onthesecurityoftlsandipsecmitigationthroughphysicalconstraints
AT reimerserik omsakerhetenhostlsochipseclindringgenomfysiskabegransningar
_version_ 1718605910569385984