Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat
Muneer Alwazzeh,Sameer Karaman,Mohammad Nur Shamma
DOI: https://doi.org/10.13052/jcsm2245-1439.933
2020-07-01
Journal of Cyber Security and Mobility
Abstract:Network security and related issues have been discussed thoroughly in this paper, especially at transport layer security network protocol, which concern with confidentiality, integrity, availability, authentication, and accountability. To mitigate and defeat Man-in-the-middle-attacks, we have proposed a new model which consists of sender and receiver systems and utilizes a combination of blowfish (BF) and Advanced Encryption Standard (AES) algorithms, symmetric key agreement to distribute public keys, Elliptic Curve Cryptography (ECC) to create secret key, and then Diffe Hellman (DH) for key exchange. Both SHA-256 hashing and Elliptic Curve Digital Signature Algorithm (ECDSA) have been applied for integrity, and authentication, respectively.