Hash function combiners in TLS and SSL

5Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake protocol to establish shared keys that are subsequently used to encrypt and authenticate the data transfer. To ensure that the obtained keys are as secure as possible, TLS and SSL deploy hash function combiners for key derivation and the authentication step in the handshake protocol. A robust combiner for hash functions takes two candidate implementations and constructs a hash function which is secure as long as at least one of the candidates is secure. In this work, we analyze the security of the proposed TLS/SSL combiner constructions for pseudorandom functions resp. message authentication codes. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Fischlin, M., Lehmann, A., & Wagner, D. (2010). Hash function combiners in TLS and SSL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5985 LNCS, pp. 268–283). https://doi.org/10.1007/978-3-642-11925-5_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free