University of Cambridge > > Computer Laboratory Security Group meeting presentations > Discussion: Bi-directional authentication in TLS

Discussion: Bi-directional authentication in TLS

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Steven J. Murdoch.

I am working on designing a new authentication algorithm for Tor, which maintains the bi-directional authentication and confidentiality guarantees, but looks similar to normal encrypted web-browsing. This is to help resist blocking based on Tor’s traffic fingerprint.

Tor needs to now perform a HTTPS -like TLS handshake, where the client authenticates the server, but not vice-versa. Then, within the encrypted tunnel, the server needs to authenticate the client. Two additional constraints are that it needs to work with unmodified OpenSSL and have minimum overhead.

I’ll be discussing some proposals for an improved protocol, and expand on the design constraints. I welcome comments on these ideas, potential flaws and any suggested improvements.

This talk is part of the Computer Laboratory Security Group meeting presentations series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


© 2006-2024, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity