SlideShare una empresa de Scribd logo
1 de 54
Naveen Kumar
M.E., ECE (Regular)
Outline
    Web Security
    Introduction to SSL/TLS
    Secure Socket Layer (SSL)
      Where, What and How about SSL

      Architecture
      The Four Protocols

      Simple Handshake process

    Transport Layer Security (TLS)
      TLS Overview
      Public Key Certificates

    Implementation & Applications of SSL/TLS
    Summary
    References

December 1, 2012                       NITTTR, Chandigarh   2
“Use your mentality, Wake up to reality”
---From the song, “I've got you under my skin”
by Cole Porter




December 1, 2012        NITTTR, Chandigarh       3
Reality!!!




December 1, 2012   NITTTR, Chandigarh   4
Web security
     Web is now widely used by businesses, government firms
      and individuals.
     but Internet & Web space are vulnerable.
     have a variety of threats related to
       Integrity : Someone might alter content

       Confidentiality : Anyone can see content

       Denial of service

       Authentication : Not clear who you are talking with
     need added security mechanisms

December 1, 2012                  NITTTR, Chandigarh           5
Introduction (contd.)
     Secure Sockets Layer (SSL)
      Developed by Netscape Corporation

      Versions 1, 2, and 3 (released in 1996)

     Transport Layer Security (TLS)
      Successor of SSL

      IETF standards track protocol, based on SSL 3.0

       Last updated in RFC 5246 (2008)

December 1, 2012            NITTTR, Chandigarh           6
Introduction (contd.)
     Transport    Layer   Security              (TLS)   and   its
      predecessor, Secure Sockets Layer (SSL), are
      cryptographic protocols that provide security for
      communications over networks such as the
      Internet.
     TLS and SSL encrypt the segments of network
      connections at the Transport Layer end-to-end.



December 1, 2012            NITTTR, Chandigarh                       7
SECURE
                   SOCKET LAYER
                       (SSL)



December 1, 2012        NITTTR, Chandigarh   8
Where SSL fits?
                   HTTP SMTP POP3            HTTPS SSMTP SPOP3

                   80    25   110             443        465   995


     Port
                                                Secure Socket Layer
     No.

                                    Transport


                                    Network


                                    Data Link




December 1, 2012                    NITTTR, Chandigarh                9
What security is provided?
     By providing:
      Endpoint Authentication

      Unilateral or Bilateral

      Communication Confidentiality
     For preventing:
       Eavesdropping

      Tampering

      Message Forgery


December 1, 2012                 NITTTR, Chandigarh   10
How security is provided?




December 1, 2012   NITTTR, Chandigarh   11
Uses public key scheme
     Each client-server pair uses
      2 public keys
           ○ one for client (browser)
              created when browser is installed on client machine
           ○ one for server (http server)
              created when server is installed on server hardware
      2 private keys
           ○ one for client browser
           ○ one for server (http server)




December 1, 2012                    NITTTR, Chandigarh               12
Cipher Suite
     Common Cipher Suite algorithms:
       Encryption algorithm

           ○ RC4,Triple DES,AES, IDEA, DES, Camellia

       Message authentication code (MAC) algorithm

           ○ Authentication by RSA, DSA, ECDSA

           ○ Hashing by MD5, SHA

       Key exchange algorithm

           ○ RSA, Diffie-Hellman, ECDH, SRP, PSK

       Pseudorandom function (PRF)

December 1, 2012                 NITTTR, Chandigarh    13
SSL Architecture




December 1, 2012   NITTTR, Chandigarh   14
SSL Architecture (Contd.)
     SSL session
       an association between client & server

       created by the Handshake Protocol

       define a set of cryptographic parameters

       may be shared by multiple SSL connections

     SSL connection
       a transient, peer-to-peer, communications link

       associated with 1 SSL session

December 1, 2012                NITTTR, Chandigarh       15
The Four Upper Layer Protocols
      Application Encryption Protocol
       Encrypt/Decrypt application data
      Change Cipher Spec Protocol
       Alert to a change in communication variables
      Alert Protocol
       Messages important to SSL connections
      Handshaking Protocol
       Establish communication variables




December 1, 2012              NITTTR, Chandigarh       16
SSL Record Protocol
Services provided are :
      Confidentiality
        using symmetric encryption with a shared secret key defined by
            Handshake Protocol
        IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128

        message is compressed before encryption

      Message integrity
        using a MAC (Message Authentication Code) created using a
            shared secret key and a short message



December 1, 2012                       NITTTR, Chandigarh                 17
SSL Record Protocol (Contd.)




December 1, 2012   NITTTR, Chandigarh   18
SSL Change Cipher Spec Protocol
     one of 3 SSL specific protocols which use the
      SSL Record protocol
     a single message
     Purpose of message
      Cause copy of pending state to current state.

      Updates cipher suite to be used on the current

           connection .

December 1, 2012            NITTTR, Chandigarh          19
SSL Alert Protocol
      conveys SSL-related alerts to peer entity
      Consists of two bytes
        1st byte : warning or fatal
        2nd byte: code for specific alerts

      specific alert types
        unexpected message, bad record mac, decompression failure,

            handshake failure, illegal parameter
        close notify, no certificate, bad certificate, unsupported certificate,

            certificate revoked, certificate expired, certificate unknown

      compressed & encrypted like all SSL data

December 1, 2012                         NITTTR, Chandigarh                        20
SSL Handshake Protocol (1/10)
     The most complex part of SSL.
     allows server & client to:
      authenticate each other
      to negotiate encryption & MAC algorithms
      to negotiate cryptographic keys to be used
     comprises a series of messages in phases
      Establish Security Capabilities
      Server Authentication and Key Exchange
      Client Authentication and Key Exchange
      Finish


December 1, 2012             NITTTR, Chandigarh     21
Simple Handshake process (2/10)

     The client(Alice) and server(Bob) must agree on various

      parameters to establish the connection
       Alice request a secure connections and presents a list of Cipher Suites

       Bob picks the strongest supported Cipher Suite

       Bob sends back his digital certificate

           ○ Including the certificate authority and his public key

       By encrypting using the server’s public key, Alice send a random

           number to Bob securely
       Alice and Bob generate key material from the random number

       Secure connection established

December 1, 2012                            NITTTR, Chandigarh                    22
Simple Handshake process (3/10)




December 1, 2012   NITTTR, Chandigarh   23
Simple Handshake process (4/10)




December 1, 2012   NITTTR, Chandigarh   24
Simple Handshake process (5/10)




December 1, 2012   NITTTR, Chandigarh   25
Simple Handshake process (6/10)




December 1, 2012   NITTTR, Chandigarh   26
Simple Handshake process (7/10)




December 1, 2012   NITTTR, Chandigarh   27
Simple Handshake process (8/10)




December 1, 2012   NITTTR, Chandigarh   28
Simple Handshake process (9/10)




December 1, 2012   NITTTR, Chandigarh   29
SSL Handshake Protocol (10/10)




December 1, 2012   NITTTR, Chandigarh   30
TLS (Transport Layer Security)
     IETF standard RFC 2246 similar to SSLv3
     with minor differences
      in record format version number
      uses HMAC for MAC
      a pseudo-random function expands secrets
      has additional alert codes
      some changes in supported ciphers
      changes in certificate negotiations
      changes in use of padding



December 1, 2012              NITTTR, Chandigarh   31
Changes from SSL 3.0 to TLS
       Fortezza removed
       Additional Alerts added
       Modification to hash calculations
       Protocol version 3.1 in ClientHello,
        ServerHello



32
 December 1, 2012            NITTTR, Chandigarh
What is TLS?
   Protocol layer
   Requires reliable transport layer (e.g. TCP)
   Supports any application protocols



                    HTTP   Telnet             FTP   LDAP
                               TLS
                               TCP
                                IP




33
 December 1, 2012              NITTTR, Chandigarh
TLS: Privacy
   Encrypt message so it cannot be read
   Use conventional cryptography with shared
    key
        DES, 3DES
        RC2, RC4
        IDEA
           A                                B
           Message   $%&#!@                 Message




34
 December 1, 2012      NITTTR, Chandigarh
TLS:Key Exchange
   Need secure method to exchange secret key
   Use public key encryption for this
        “key pair” is used - either one can encrypt and
         then the other can decrypt
        slower than conventional cryptography
        share one key, keep the other private
       Choices are RSA or Diffie-Hellman



35
 December 1, 2012             NITTTR, Chandigarh
TLS: Integrity
       Compute fixed-length Message
        Authentication Code (MAC)
        Includes hash of message
        Includes a shared secret
        Include sequence number
       Transmit MAC with message




36
 December 1, 2012            NITTTR, Chandigarh
Integrity (Contd.)
       Receiver creates new MAC
        should match transmitted MAC
       TLS allows MD5, SHA-1
      A                                   B
       Message                            Message’    MAC

          MAC                              MAC’      =?




37
 December 1, 2012          NITTTR, Chandigarh
TLS: Authentication
         Verify identities of participants
         Client authentication is optional
         Certificate is used to associate identity with
          public key and other attributes

      A                                              B
      Certificate

                                                     Certificate




38
 December 1, 2012               NITTTR, Chandigarh
TLS: Architecture
       TLS defines Record Protocol to transfer
        application and TLS information
       A session is established using a Handshake
        Protocol

                    Handshake      Change                  Alert
                     Protocol    Cipher Spec              Protocol


                                TLS Record Protocol




39
 December 1, 2012                    NITTTR, Chandigarh
TLS: Record Protocol




40
 December 1, 2012   NITTTR, Chandigarh
TLS: Handshake
       Negotiate Cipher-Suite Algorithms
        Symmetric cipher to use
        Key exchange method
        Message digest function
   Establish and share master secret
   Optionally authenticate server and/or client




41
 December 1, 2012           NITTTR, Chandigarh
Handshake Phases
       Hello messages
       Certificate and Key Exchange messages
       Change Cipher Spec and Finished messages




42
 December 1, 2012          NITTTR, Chandigarh
TLS: Hello
       Client “Hello” - initiates session
        Propose protocol version
        Propose cipher suite
        Server chooses protocol and suite
       Client may request use of cached session
        Server chooses whether to honor request




43
 December 1, 2012               NITTTR, Chandigarh
TLS: Key Exchange
       Server sends certificate containing public key
        (RSA) or Diffie-Hellman parameters
       Client sends encrypted “pre-master” secret to
        server using Client Key Exchange message
       Master secret calculated
        Use random values passed in Client and Server Hello

             messages

44
 December 1, 2012              NITTTR, Chandigarh
Public Key Certificates
       X.509 Certificate associates public key with
        identity
       Certification Authority (CA) creates certificate
        Adheres to policies and verifies identity

        Signs certificate

       User of Certificate must ensure it is valid


45
 December 1, 2012               NITTTR, Chandigarh
Validating a Certificate

       Must recognize accepted CA in certificate
        chain
        One CA may issue certificate for another CA

       Must verify that certificate has not been
        revoked
        CA publishes Certificate Revocation List (CRL)


46
 December 1, 2012            NITTTR, Chandigarh
X.509 Certificate Issues
       Certificate Administration is complex
        Hierarchy of Certification Authorities
        Mechanisms for requesting, issuing, revoking
             certificates
   X.500 names are complicated
   Description  formats are                       cumbersome
    (ASN.1)



47
 December 1, 2012             NITTTR, Chandigarh
TLS: HTTP Application
       HTTP is most common TLS application
        https://
   Requires TLS-capable web server
   Requires TLS-capable web browser
        Netscape Navigator
        Internet Explorer
        Cryptozilla
             ○ Netscape Mozilla sources with SSLeay



48
 December 1, 2012                NITTTR, Chandigarh
TLS “Alternatives”
   S-HTTP: secure HTTP protocol, shttp://
   IPSec: secure IP
   SET: Secure Electronic Transaction
        Protocol and infrastructure for bank card
             payments
       SASL: Simple Authentication and Security
        Layer (RFC 2222)



49
 December 1, 2012             NITTTR, Chandigarh
Implementation of SSL/TLS
      SSL and TLS have been widely implemented
        Open source software projects

            ○ OpenSSL, NSS, or GnuTLS

        Microsoft Windows

            ○ Part of its Secure Channel

        Browsers

            ○ Apple Safari

            ○ Mozilla Firefox (2+)

            ○ Internet Explorer, etc.

December 1, 2012                        NITTTR, Chandigarh   50
Application of SSL/TLS
      On top of the Transport Layer protocols
       Primarily with TCP

       Datagram Transport Layer Security(DTLS) for UDP

      Encapsulating the application protocols
       HTTP (HTTPS)

       for securing WWW traffic

       FTP (FTPS), SMTP, NNTP, etc.


December 1, 2012               NITTTR, Chandigarh         51
Summary
       SSL/TLS addresses the need for security in
        Internet communications
        Privacy - conventional encryption

        Integrity - Message Authentication Codes

        Authentication - X.509 certificates

       SSL in use today with web browsers and
        servers

52
 December 1, 2012               NITTTR, Chandigarh
References
      William Stallings, 5th Edition, “Transport-Level
       Security”, Chapter 16, Pages : 509-543
      www.cse.buffalo.edu/DBGROUP/nachi/ecopre
       s/fengmei.ppt
      http://www.slideshare.net/leethree/ssl-intro




December 1, 2012            NITTTR, Chandigarh            53
December 1, 2012   NITTTR, Chandigarh   54

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Kerberos
KerberosKerberos
Kerberos
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
IP Security
IP SecurityIP Security
IP Security
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 

Destacado

Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
wardjo
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Intruders
IntrudersIntruders
Intruders
techn
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 

Destacado (20)

Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
ip security
ip securityip security
ip security
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
IP Security
IP SecurityIP Security
IP Security
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Ip security
Ip security Ip security
Ip security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Firewall
Firewall Firewall
Firewall
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Intruders
IntrudersIntruders
Intruders
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Firewall
FirewallFirewall
Firewall
 

Similar a Secure Socket Layer

ssltls-121201083121-phpapp01 (1).pdf
ssltls-121201083121-phpapp01 (1).pdfssltls-121201083121-phpapp01 (1).pdf
ssltls-121201083121-phpapp01 (1).pdf
ssuserec53e73
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 

Similar a Secure Socket Layer (20)

ssltls-121201083121-phpapp01 (1).pdf
ssltls-121201083121-phpapp01 (1).pdfssltls-121201083121-phpapp01 (1).pdf
ssltls-121201083121-phpapp01 (1).pdf
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Cryptographic Agility in Corda
Cryptographic Agility in CordaCryptographic Agility in Corda
Cryptographic Agility in Corda
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA Algorithm
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
Signpost at FOCI 2013
Signpost at FOCI 2013Signpost at FOCI 2013
Signpost at FOCI 2013
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 

Más de Naveen Kumar

Más de Naveen Kumar (20)

Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ph.D Research proposal
Ph.D Research proposalPh.D Research proposal
Ph.D Research proposal
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Cell Phone Antennas
Cell Phone AntennasCell Phone Antennas
Cell Phone Antennas
 
Thesis on PIFA
Thesis on PIFAThesis on PIFA
Thesis on PIFA
 
Electronics Quiz
Electronics QuizElectronics Quiz
Electronics Quiz
 
VHDL coding in Xilinx
VHDL coding in XilinxVHDL coding in Xilinx
VHDL coding in Xilinx
 
Optimization in HFSS
Optimization in HFSSOptimization in HFSS
Optimization in HFSS
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane
 
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
 
A novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsA novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsets
 
A compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeA compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground plane
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance Theory
 
UART
UARTUART
UART
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
AR model
AR modelAR model
AR model
 
VLSI routing
VLSI routingVLSI routing
VLSI routing
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Secure Socket Layer

  • 2. Outline  Web Security  Introduction to SSL/TLS  Secure Socket Layer (SSL)  Where, What and How about SSL  Architecture  The Four Protocols  Simple Handshake process  Transport Layer Security (TLS)  TLS Overview  Public Key Certificates  Implementation & Applications of SSL/TLS  Summary  References December 1, 2012 NITTTR, Chandigarh 2
  • 3. “Use your mentality, Wake up to reality” ---From the song, “I've got you under my skin” by Cole Porter December 1, 2012 NITTTR, Chandigarh 3
  • 4. Reality!!! December 1, 2012 NITTTR, Chandigarh 4
  • 5. Web security  Web is now widely used by businesses, government firms and individuals.  but Internet & Web space are vulnerable.  have a variety of threats related to  Integrity : Someone might alter content  Confidentiality : Anyone can see content  Denial of service  Authentication : Not clear who you are talking with  need added security mechanisms December 1, 2012 NITTTR, Chandigarh 5
  • 6. Introduction (contd.)  Secure Sockets Layer (SSL) Developed by Netscape Corporation Versions 1, 2, and 3 (released in 1996)  Transport Layer Security (TLS) Successor of SSL IETF standards track protocol, based on SSL 3.0  Last updated in RFC 5246 (2008) December 1, 2012 NITTTR, Chandigarh 6
  • 7. Introduction (contd.)  Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet.  TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. December 1, 2012 NITTTR, Chandigarh 7
  • 8. SECURE SOCKET LAYER (SSL) December 1, 2012 NITTTR, Chandigarh 8
  • 9. Where SSL fits? HTTP SMTP POP3 HTTPS SSMTP SPOP3 80 25 110 443 465 995 Port Secure Socket Layer No. Transport Network Data Link December 1, 2012 NITTTR, Chandigarh 9
  • 10. What security is provided?  By providing: Endpoint Authentication Unilateral or Bilateral Communication Confidentiality  For preventing:  Eavesdropping Tampering Message Forgery December 1, 2012 NITTTR, Chandigarh 10
  • 11. How security is provided? December 1, 2012 NITTTR, Chandigarh 11
  • 12. Uses public key scheme  Each client-server pair uses 2 public keys ○ one for client (browser)  created when browser is installed on client machine ○ one for server (http server)  created when server is installed on server hardware 2 private keys ○ one for client browser ○ one for server (http server) December 1, 2012 NITTTR, Chandigarh 12
  • 13. Cipher Suite  Common Cipher Suite algorithms:  Encryption algorithm ○ RC4,Triple DES,AES, IDEA, DES, Camellia  Message authentication code (MAC) algorithm ○ Authentication by RSA, DSA, ECDSA ○ Hashing by MD5, SHA  Key exchange algorithm ○ RSA, Diffie-Hellman, ECDH, SRP, PSK  Pseudorandom function (PRF) December 1, 2012 NITTTR, Chandigarh 13
  • 14. SSL Architecture December 1, 2012 NITTTR, Chandigarh 14
  • 15. SSL Architecture (Contd.)  SSL session  an association between client & server  created by the Handshake Protocol  define a set of cryptographic parameters  may be shared by multiple SSL connections  SSL connection  a transient, peer-to-peer, communications link  associated with 1 SSL session December 1, 2012 NITTTR, Chandigarh 15
  • 16. The Four Upper Layer Protocols  Application Encryption Protocol Encrypt/Decrypt application data  Change Cipher Spec Protocol Alert to a change in communication variables  Alert Protocol Messages important to SSL connections  Handshaking Protocol Establish communication variables December 1, 2012 NITTTR, Chandigarh 16
  • 17. SSL Record Protocol Services provided are :  Confidentiality  using symmetric encryption with a shared secret key defined by Handshake Protocol  IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128  message is compressed before encryption  Message integrity  using a MAC (Message Authentication Code) created using a shared secret key and a short message December 1, 2012 NITTTR, Chandigarh 17
  • 18. SSL Record Protocol (Contd.) December 1, 2012 NITTTR, Chandigarh 18
  • 19. SSL Change Cipher Spec Protocol  one of 3 SSL specific protocols which use the SSL Record protocol  a single message  Purpose of message Cause copy of pending state to current state. Updates cipher suite to be used on the current connection . December 1, 2012 NITTTR, Chandigarh 19
  • 20. SSL Alert Protocol  conveys SSL-related alerts to peer entity  Consists of two bytes  1st byte : warning or fatal  2nd byte: code for specific alerts  specific alert types  unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter  close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown  compressed & encrypted like all SSL data December 1, 2012 NITTTR, Chandigarh 20
  • 21. SSL Handshake Protocol (1/10)  The most complex part of SSL.  allows server & client to: authenticate each other to negotiate encryption & MAC algorithms to negotiate cryptographic keys to be used  comprises a series of messages in phases Establish Security Capabilities Server Authentication and Key Exchange Client Authentication and Key Exchange Finish December 1, 2012 NITTTR, Chandigarh 21
  • 22. Simple Handshake process (2/10)  The client(Alice) and server(Bob) must agree on various parameters to establish the connection  Alice request a secure connections and presents a list of Cipher Suites  Bob picks the strongest supported Cipher Suite  Bob sends back his digital certificate ○ Including the certificate authority and his public key  By encrypting using the server’s public key, Alice send a random number to Bob securely  Alice and Bob generate key material from the random number  Secure connection established December 1, 2012 NITTTR, Chandigarh 22
  • 23. Simple Handshake process (3/10) December 1, 2012 NITTTR, Chandigarh 23
  • 24. Simple Handshake process (4/10) December 1, 2012 NITTTR, Chandigarh 24
  • 25. Simple Handshake process (5/10) December 1, 2012 NITTTR, Chandigarh 25
  • 26. Simple Handshake process (6/10) December 1, 2012 NITTTR, Chandigarh 26
  • 27. Simple Handshake process (7/10) December 1, 2012 NITTTR, Chandigarh 27
  • 28. Simple Handshake process (8/10) December 1, 2012 NITTTR, Chandigarh 28
  • 29. Simple Handshake process (9/10) December 1, 2012 NITTTR, Chandigarh 29
  • 30. SSL Handshake Protocol (10/10) December 1, 2012 NITTTR, Chandigarh 30
  • 31. TLS (Transport Layer Security)  IETF standard RFC 2246 similar to SSLv3  with minor differences in record format version number uses HMAC for MAC a pseudo-random function expands secrets has additional alert codes some changes in supported ciphers changes in certificate negotiations changes in use of padding December 1, 2012 NITTTR, Chandigarh 31
  • 32. Changes from SSL 3.0 to TLS  Fortezza removed  Additional Alerts added  Modification to hash calculations  Protocol version 3.1 in ClientHello, ServerHello 32 December 1, 2012 NITTTR, Chandigarh
  • 33. What is TLS?  Protocol layer  Requires reliable transport layer (e.g. TCP)  Supports any application protocols HTTP Telnet FTP LDAP TLS TCP IP 33 December 1, 2012 NITTTR, Chandigarh
  • 34. TLS: Privacy  Encrypt message so it cannot be read  Use conventional cryptography with shared key DES, 3DES RC2, RC4 IDEA A B Message $%&#!@ Message 34 December 1, 2012 NITTTR, Chandigarh
  • 35. TLS:Key Exchange  Need secure method to exchange secret key  Use public key encryption for this “key pair” is used - either one can encrypt and then the other can decrypt slower than conventional cryptography share one key, keep the other private  Choices are RSA or Diffie-Hellman 35 December 1, 2012 NITTTR, Chandigarh
  • 36. TLS: Integrity  Compute fixed-length Message Authentication Code (MAC) Includes hash of message Includes a shared secret Include sequence number  Transmit MAC with message 36 December 1, 2012 NITTTR, Chandigarh
  • 37. Integrity (Contd.)  Receiver creates new MAC should match transmitted MAC  TLS allows MD5, SHA-1 A B Message Message’ MAC MAC MAC’ =? 37 December 1, 2012 NITTTR, Chandigarh
  • 38. TLS: Authentication  Verify identities of participants  Client authentication is optional  Certificate is used to associate identity with public key and other attributes A B Certificate Certificate 38 December 1, 2012 NITTTR, Chandigarh
  • 39. TLS: Architecture  TLS defines Record Protocol to transfer application and TLS information  A session is established using a Handshake Protocol Handshake Change Alert Protocol Cipher Spec Protocol TLS Record Protocol 39 December 1, 2012 NITTTR, Chandigarh
  • 40. TLS: Record Protocol 40 December 1, 2012 NITTTR, Chandigarh
  • 41. TLS: Handshake  Negotiate Cipher-Suite Algorithms Symmetric cipher to use Key exchange method Message digest function  Establish and share master secret  Optionally authenticate server and/or client 41 December 1, 2012 NITTTR, Chandigarh
  • 42. Handshake Phases  Hello messages  Certificate and Key Exchange messages  Change Cipher Spec and Finished messages 42 December 1, 2012 NITTTR, Chandigarh
  • 43. TLS: Hello  Client “Hello” - initiates session Propose protocol version Propose cipher suite Server chooses protocol and suite  Client may request use of cached session Server chooses whether to honor request 43 December 1, 2012 NITTTR, Chandigarh
  • 44. TLS: Key Exchange  Server sends certificate containing public key (RSA) or Diffie-Hellman parameters  Client sends encrypted “pre-master” secret to server using Client Key Exchange message  Master secret calculated Use random values passed in Client and Server Hello messages 44 December 1, 2012 NITTTR, Chandigarh
  • 45. Public Key Certificates  X.509 Certificate associates public key with identity  Certification Authority (CA) creates certificate Adheres to policies and verifies identity Signs certificate  User of Certificate must ensure it is valid 45 December 1, 2012 NITTTR, Chandigarh
  • 46. Validating a Certificate  Must recognize accepted CA in certificate chain One CA may issue certificate for another CA  Must verify that certificate has not been revoked CA publishes Certificate Revocation List (CRL) 46 December 1, 2012 NITTTR, Chandigarh
  • 47. X.509 Certificate Issues  Certificate Administration is complex Hierarchy of Certification Authorities Mechanisms for requesting, issuing, revoking certificates  X.500 names are complicated  Description formats are cumbersome (ASN.1) 47 December 1, 2012 NITTTR, Chandigarh
  • 48. TLS: HTTP Application  HTTP is most common TLS application https://  Requires TLS-capable web server  Requires TLS-capable web browser Netscape Navigator Internet Explorer Cryptozilla ○ Netscape Mozilla sources with SSLeay 48 December 1, 2012 NITTTR, Chandigarh
  • 49. TLS “Alternatives”  S-HTTP: secure HTTP protocol, shttp://  IPSec: secure IP  SET: Secure Electronic Transaction Protocol and infrastructure for bank card payments  SASL: Simple Authentication and Security Layer (RFC 2222) 49 December 1, 2012 NITTTR, Chandigarh
  • 50. Implementation of SSL/TLS  SSL and TLS have been widely implemented  Open source software projects ○ OpenSSL, NSS, or GnuTLS  Microsoft Windows ○ Part of its Secure Channel  Browsers ○ Apple Safari ○ Mozilla Firefox (2+) ○ Internet Explorer, etc. December 1, 2012 NITTTR, Chandigarh 50
  • 51. Application of SSL/TLS  On top of the Transport Layer protocols Primarily with TCP Datagram Transport Layer Security(DTLS) for UDP  Encapsulating the application protocols HTTP (HTTPS) for securing WWW traffic FTP (FTPS), SMTP, NNTP, etc. December 1, 2012 NITTTR, Chandigarh 51
  • 52. Summary  SSL/TLS addresses the need for security in Internet communications Privacy - conventional encryption Integrity - Message Authentication Codes Authentication - X.509 certificates  SSL in use today with web browsers and servers 52 December 1, 2012 NITTTR, Chandigarh
  • 53. References  William Stallings, 5th Edition, “Transport-Level Security”, Chapter 16, Pages : 509-543  www.cse.buffalo.edu/DBGROUP/nachi/ecopre s/fengmei.ppt  http://www.slideshare.net/leethree/ssl-intro December 1, 2012 NITTTR, Chandigarh 53
  • 54. December 1, 2012 NITTTR, Chandigarh 54

Notas del editor

  1. Stallings Fig 17-2.
  2. SSL Record Protocol defines these two services for SSL connections.
  3. Stallings Fig 17-6.
  4. Hash includes Finished and CertificateVerify messages following client cert types removed: rsa_ephemeral_dh dss_ephemeral_dh fortezza_dms SSL 2 -> SSL 3.0 major changes
  5. Reliable transport layer delivers data without duplicates or missing data, and in order. Not really transparent to applications Application must understand desired security level and if TLS cannot provide that must not assume a secure connection Application must communicate security parameters to TLS Application may introduce security issues e.g. HTTP 1.0 connection close with empty Content-Length
  6. Most block ciphers (64 bit blocks) except for RC4 stream cipher CBC cipher block chaining use IV (initialization vector) XOR previous encrypted block with block then encrypt …
  7. Secret is used so that someone cannot replace both message and MAC, putting a new matching MAC in place of the original
  8. Operational and pending states
  9. Currently no compression defined but could be client boundaries are not preserved 2^14 bytes or less in protocol unit md5, sha-1, none MAC des, 3des, des40, rc2, rc4, idea none encryption
  10. Encryption mac key exchange Des/3des/des40 md5, sha1, none rsa, dh rc2 rc4 idea none
  11. Server “ Hello Request ”- ask client to restart hello includes some random data for creating the master secret
  12. Client generates 48-byte secret random # , encrypts using server’s public key, sends to server if diffie-hellman, p,g
  13. PKCS standards from RSA for RSA certificates PKCS #10 cert requests PKCS #9 cert attributes PKCS #7 cert chain format application/x-pkcs7-mime used to load CA chain into browser
  14. Mention different kinds of certificates identity encryption etc
  15. S-HTTP inter-operates with http signature authentication encryption public key key exchange, & externally arranged Secure * Secure-HTTP/1.4 : Request URI Secure-HTTP/1.4 200 OK response header lines convey information e.g. Certificate-Info: has cert, Encryption-Identity: x500 name ------------ IPSec RFC 1825-1829 required for IPv6, optional for IPv4 transport mode - protect contents of IP packet tunnel mode - protect entire IP packet encryption, MAC SASL Means to add authentication to connection-based protocol Variety of mechanisms Kerberos V4, GSSAPI, “External” Allows separation of authorization identity from client identity in credentials Permits authenticated state in protocol