No warranty is given about the accuracy of the copy. However, users may print, download, or email articles for individual use. Copyright of Security & Communication Networks is the property of Hindawi Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission.Finally, some methods to improve the protocol security of shadowsocks(R) are proposed. Compared with Peng's attack method, the method is more effective and more suitable for actual attacks. The attack method is a passive attack and can decrypt the shadowsocks packets encrypted with any encryption option. ![]() The vulnerability of the shadowsocks(R) encryption mechanism is found, and an attack method of shadowsocks(R) is proposed. Based on Chen's work, this paper further clarifies the shadowsocks(R) protocol format and studies the encryption mechanism of shadowsocks(R) from the perspective of protocol analysis. started with the cryptographic algorithm used by shadowsocks(R) and preliminarily discussed the confidentiality of user data under the protection of shadowsocks(R) in theory. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none-AEAD encryption options using a redirection attack. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |