Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV


KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 73-80, Feb. 2015
10.3745/KTCCS.2015.4.2.73,   PDF Download:

Abstract

In the various application environments on the internet, we use verified cipher algorithm to protect personal information. Even so, if an application method isn``t proper, the information you want to keep can be intercepted. One of the representative examples of it is a PADDING ORACLE ATTACK. This thesis studied about STRP, MIKEY, CMS, IPSec, TLS, IPTV, an application environment which apply CBC operational mode based on block cipher and CBC padding method, and about whether we can attack against the Padding Oracle Attack as well as the vulnerable points.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. J. Hwang, M. S. Park, D. J. Moon, H. C. Kang, J. S. Kim and C. H. Lee, "Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV," KIPS Transactions on Computer and Communication Systems, vol. 4, no. 2, pp. 73-80, 2015. DOI: 10.3745/KTCCS.2015.4.2.73.

[ACM Style]
Seong Jin Hwang, Myung Seo Park, Duk Jae Moon, Hyung Chul Kang, Jong Sung Kim, and Chang Hoon Lee. 2015. Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV. KIPS Transactions on Computer and Communication Systems, 4, 2, (2015), 73-80. DOI: 10.3745/KTCCS.2015.4.2.73.