RSA256中使用令牌拆分和连接避免JSON Web令牌泄漏

Malvin Malvin, Cutifa Safitri
{"title":"RSA256中使用令牌拆分和连接避免JSON Web令牌泄漏","authors":"Malvin Malvin, Cutifa Safitri","doi":"10.35806/ijoced.v5i1.325","DOIUrl":null,"url":null,"abstract":"This research aims to protect users from JWT (JSON Web Token) leakage, which is listed plainly in the Response Header in the web browser console. The risk of malicious attackers stealing the JWT is highly dangerous since the API (Application Programming Interface) will be within the control of malicious attackers, leading to identity theft and data abuse due to the JWT leakage. As a solution, this paper proposed a method in which the JWT bearer token will be split, separately encrypted by RSA256, and concatenated into a new unique token to limit attacker accessibility towards the JWT token. The benefit of this proposed method is envisaged to achieve a more secure web application for user data protection and security optimization. The idea of this method is to modify the bearer token by splitting, encrypting, and concatenating it to be a unique token. The product of the encryption process is an unrecognizable token in the form of letters and punctuation which attackers cannot manipulate. The encrypted code will be returned to the initial location in Response Header. After testing, it is proven that modifying the bearer token by splitting and concatenating provides more security to a web application.","PeriodicalId":34235,"journal":{"name":"Indonesian Journal of Computing Engineering and Design","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"JSON Web Token Leakage Avoidance Using Token Split and Concatenate in RSA256\",\"authors\":\"Malvin Malvin, Cutifa Safitri\",\"doi\":\"10.35806/ijoced.v5i1.325\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research aims to protect users from JWT (JSON Web Token) leakage, which is listed plainly in the Response Header in the web browser console. The risk of malicious attackers stealing the JWT is highly dangerous since the API (Application Programming Interface) will be within the control of malicious attackers, leading to identity theft and data abuse due to the JWT leakage. As a solution, this paper proposed a method in which the JWT bearer token will be split, separately encrypted by RSA256, and concatenated into a new unique token to limit attacker accessibility towards the JWT token. The benefit of this proposed method is envisaged to achieve a more secure web application for user data protection and security optimization. The idea of this method is to modify the bearer token by splitting, encrypting, and concatenating it to be a unique token. The product of the encryption process is an unrecognizable token in the form of letters and punctuation which attackers cannot manipulate. The encrypted code will be returned to the initial location in Response Header. After testing, it is proven that modifying the bearer token by splitting and concatenating provides more security to a web application.\",\"PeriodicalId\":34235,\"journal\":{\"name\":\"Indonesian Journal of Computing Engineering and Design\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Indonesian Journal of Computing Engineering and Design\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.35806/ijoced.v5i1.325\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Computing Engineering and Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35806/ijoced.v5i1.325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

这项研究旨在保护用户免受JWT (JSON Web令牌)泄漏,这在Web浏览器控制台的响应头中明确列出。恶意攻击者窃取JWT的风险是非常危险的,因为API(应用程序编程接口)将在恶意攻击者的控制之下,导致由于JWT泄漏而导致身份盗窃和数据滥用。作为解决方案,本文提出了一种方法,该方法将JWT承载令牌拆分,通过RSA256单独加密,并连接成一个新的唯一令牌,以限制攻击者对JWT令牌的访问。这种提出的方法的好处是设想实现一个更安全的web应用程序的用户数据保护和安全优化。此方法的思想是通过拆分、加密和连接来修改承载令牌,使其成为唯一的令牌。加密过程的产物是一个无法识别的字母和标点符号形式的令牌,攻击者无法操纵。加密的代码将返回到响应头中的初始位置。经过测试,证明通过拆分和连接来修改承载令牌可以为web应用程序提供更多的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
JSON Web Token Leakage Avoidance Using Token Split and Concatenate in RSA256
This research aims to protect users from JWT (JSON Web Token) leakage, which is listed plainly in the Response Header in the web browser console. The risk of malicious attackers stealing the JWT is highly dangerous since the API (Application Programming Interface) will be within the control of malicious attackers, leading to identity theft and data abuse due to the JWT leakage. As a solution, this paper proposed a method in which the JWT bearer token will be split, separately encrypted by RSA256, and concatenated into a new unique token to limit attacker accessibility towards the JWT token. The benefit of this proposed method is envisaged to achieve a more secure web application for user data protection and security optimization. The idea of this method is to modify the bearer token by splitting, encrypting, and concatenating it to be a unique token. The product of the encryption process is an unrecognizable token in the form of letters and punctuation which attackers cannot manipulate. The encrypted code will be returned to the initial location in Response Header. After testing, it is proven that modifying the bearer token by splitting and concatenating provides more security to a web application.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
14
审稿时长
20 weeks
期刊最新文献
A Review on Dynamic Network Using Flexible Active-Mode Period Scheme for Telemedicine Preservation of West Java Culinary Recipe Using Augmented Reality, Photogrammetry, and Storytelling Illustration A Systematic Literature Review of Sustainable Manufacturing: Green Manufacturing Practices in Asia Improvement in the Reinforced Concrete Beam with Embedded Polystyrene under Static Load Webtoon Pupus Putus Sekolah as The Educational Media of Gender Equality for Young Generation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1