TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April 15 2010 Course: CISC856 - TCP/IP and Upper Layer Protocols.

Slides:



Advertisements
Similar presentations
Web security: SSL and TLS
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Secure Socket Layer.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Cryptography and Network Security Chapter 17
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Chapter 8 Web Security.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
11 Secure Sockets Layer (SSL) Protocol (SSL) Protocol Saturday, University of Palestine Applied and Urban Engineering College Information Security.
Secure Socket Layer (SSL)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Web Security Network Systems Security
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
SARVAJANIK COLLEGE OF ENGINEERING & TECHNOLOGY. Secure Sockets Layer (SSL) Protocol Presented By Shivangi Modi Presented By Shivangi ModiCo-M(Shift-1)En.No
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Secure Sockets Layer (SSL) Protocol by Steven Giovenco.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Executive Director and Endowed Chair
IT443 – Network Security Administration Instructor: Bo Sheng
CSCI 555 Adv Computer Security
Cryptography and Network Security
Secure Sockets Layer (SSL)
UNIT.4 IP Security.
CSCE 715: Network Systems Security
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS, Part II
CSE 4095 Transport Layer Security TLS
Cryptography and Network Security
Cryptography and Network Security Chapter 16
Secure Web Application-SSL
Cryptography and Network Security
Web Security (TRANSPORT-LEVEL SECURITY)
SSL (Secure Socket Layer)
Chapter 7 WEB Security.
Web Security (TRANSPORT-LEVEL SECURITY)
Lecture 8: Transport Level Security – SSL/TLS
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Security at the Transport Layer: SSL and TLS
CSCE 815 Network Security Lecture 16
SSL Protocol Figures used in the presentation
The Secure Sockets Layer (SSL) Protocol
Cryptography and Network Security Chapter 16
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Chapter 7 WEB Security.
Transport Layer Security (TLS)
Cryptography and Network Security
Presentation transcript:

TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols Date: April

What is TLS/SSL ● Protocol layer below application layer ● Can work on top of TCP or UDP ● Any application protocol can work over TLS

Motivation Security features in various network layers – Network layer – IPSec and IKE – Transport layer - SSL/TLS – Application layer – PGP and many more Transport layer security provides end-to-end security without involving intermediaries and applications don't need to be modified too much

TLS in the TCP/IP suite Application Layer Data Link IP UDPTCP TLS Record Protocol TLS Data Protocol TLS Handshake Protocol TLS Change Cipher Spec TLS Alert Protocol

Encryption Basics Classes of Cryptographic Systems – Unkeyed – One-way functions, hash functions – MD5, SHA1 – Shared key encryption – DES, AES, 3DES, RC2, RC4, etc. – Public key encryption – RSA, DSA, FORTEZZA TLS uses all 3 kinds of encryption

TLS Features Privacy Integrity Authentication

Privacy Only communicating parties can interpret the content Cryptographically protects messages before leaving the sender Uses conventional cryptography with a shared key created dynamically

Integrity Content modified in transit is detected and discarded Each TLS PDU is affixed with a message authentication code (MAC) : Hash of the message – MD5 and SHA1 Shared secret Sequence number

Authentication Communicating parties are able to verify each other's identity Based on public key certificates Uses X.509 protocol for certificate management Client authentication is optional

A-PDU or less lossless Application Fragment Compress Add Message Authorization Code (MAC) Encrypt Add PCI TLS PDU TCP

Separate port strategy Separate TCP/UDP ports are used for secure versions of the application protocols fixed by IANA Standard naming convention is to use the un-secured application protocol name affixed with an 's' For Example https (443), imaps (993), ldaps (636) etc Client Server listening on TCP port 443 TCP Connection setup TLS Handshake HTTP PDU

Upward negotiation strategy Additional commands are added to the protocol to negotiate use of TLS. Same port can serve both secured and un-secured versions of the protocol Examples : Extended SMTP (with STARTTLS extension), HTTP v1.1 (using upgrade header field) Client Server listening on TCP port 25 TCP Connection setup SMTP EHLO TLS Handshake SMTP EHLO SMTP PDU STARTTLS

Content type Major version Minor versionCompressed length TLS PCI Encrypted Text/ Payload Encrypted MAC TLS Protocol Format TLSCipherText

TLS Protocol Format TLS Record Protocol TLS Data Protocol TLS Handshake Protocol TLS Change Cipher Spec TLS Alert Protocol

TLS Session and Connection TLS Connection – Used for actual cryptographically protected data transmission TLS Session – Association between two communication parties created using the TLS handshake protocol. Can be broken and resumed and shared among multiple TLS connections.

TLS Handshake Protocol Forms the core of TLS Allows a client and server to authenticate each other and to negotiate connection parameters like cipher suites and compression methods Initial transmissions in plaintext

TLS connection state elements Server and client random seeds Server write MAC key Client write MAC key Server write key Client write key Sequence numbers

client_hello server_hello Phase 1: Establish security capabilities. Phase 2: Server may send certificate, key exchange, and request certificate. Server signals end of hello message phase. Phase 3: Client sends certificate if requested. Client sends key exchange. Clent may send certificate verification. Phase 4: Change cipher suite and finish handshake protocol. certificate server_key_exchage certificate_request server_hello_done certificate client_key_exchange certificate_verify change_cipher_spec finished change_cipher_spec finishedrequired optional ClientServerTime

TLS ClientHello PDU

client_hello server_hello Phase 1: Establish security capabilities. Phase 3: Client sends certificate if requested. Client sends key exchange. Clent may send certificate verification. Phase 4: Change cipher suite and finish handshake protocol. Phase 2: Server may send certificate, key exchange, and request certificate. Server signals end of hello message phase. certificate server_key_exchage certificate_request server_hello_done certificate client_key_exchange certificate_verify change_cipher_spec finished change_cipher_spec finishedrequired optional ClientServerTime

TLS Certificate PDU

client_hello server_hello Phase 1: Establish security capabilities. Phase 2: Server may send certificate, key exchange, and request certificate. Server signals end of hello message phase. Phase 3: Client sends certificate if requested. Client sends key exchange. Clent may send certificate verification. certificate server_key_exchage certificate_request server_hello_done certificate client_key_exchange certificate_verify Phase 4: Change cipher suite and finish handshake protocol. change_cipher_spec finished change_cipher_spec finished ClientServerTime required optional

TLS Finished PDU

A typical TLS Webrequest Internet DNS TCP Connection setup TCP Connection SYN, SYN ACK TLS Handshake TLS ChangeCipherSpec HTTP TLS Connection TLS Session

A typical TLS Webrequest Internet TCP Connection setup SYN, SYN ACK TCP Connection TLS Connection HTTP TLS Session ClientHello, SessionID ServerHello, SessionID TLS ChangeCipherSpec HTTP

References yer_Security SSL and TLS - Theory and Practice by Rolf Oppliger [Artech house 2009] RFCs : 2246, 2818, 3207