Network Security Gene Itkis

Slides:



Advertisements
Similar presentations
SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Advertisements

1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Secure Socket Layer.
Web security (Spoofing & TLS & DNS) Ge Zhang. Web surfing yahoo IP of yahoo? Get index.htm from Response from
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Intro to SSL/TLS Network Security Gene Itkis. 6/14/2015 Gene Itkis: CS558 Network Security 2 Origins Internet Engineering Task Force (IETF) –
Intro to SSL/TLS Network Security Gene Itkis. 6/23/2015 cs Network Security (Gene Itkis) 2 Origins Internet Engineering Task Force (IETF) –
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
11 Secure Sockets Layer (SSL) Protocol (SSL) Protocol Saturday, University of Palestine Applied and Urban Engineering College Information Security.
Secure Socket Layer (SSL)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Proposed Transport Layer Security (TLS) Evidence Extensions Russ Housley IETF 67 – TLS WG Session.
Web Security Network Systems Security
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 3: Securing TCP.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
SARVAJANIK COLLEGE OF ENGINEERING & TECHNOLOGY. Secure Sockets Layer (SSL) Protocol Presented By Shivangi Modi Presented By Shivangi ModiCo-M(Shift-1)En.No
Secure Sockets Layer (SSL) Protocol by Steven Giovenco.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
8-1 CSE 4707/5850 Network Security (2) SSL/TLS. 8-2 Think about Google or YouTube  Desired properties  Indeed the other side is Google or YouTube server.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Executive Director and Endowed Chair
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
Secure Sockets Layer (SSL)
Internet Security CS457 Seminar Zhao Cheng
UNIT.4 IP Security.
CSCE 715: Network Systems Security
Visit for more Learning Resources
Cryptography and Network Security Chapter 16
COMP3220 Web Infrastructure COMP6218 Web Architecture
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS, Part II
Mark A. Shaw CS 522 Project Presentation
CSE 4095 Transport Layer Security TLS
Cryptography and Network Security
Cryptography and Network Security
Chapter 7 WEB Security.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Security at the Transport Layer: SSL and TLS
SSL Protocol Figures used in the presentation
The Secure Sockets Layer (SSL) Protocol
Chapter 7 WEB Security.
Transport Layer Security (TLS)
Unit 8 Network Security.
Advanced Computer Networks
Security at the Transport Layer
Virtual Private Networks (VPN)
Cryptography and Network Security
Integrated Security System
TLS Encryption and Decryption
Presentation transcript:

Network Security Gene Itkis Intro to SSL/TLS Network Security Gene Itkis

Gene Itkis: CS558 Network Security Origins Internet Engineering Task Force (IETF) www.ietf.org Documents: RFC 2246 ANSI X9.42 ITU X.509 Netscape 5/1/2018 Gene Itkis: CS558 Network Security

Gene Itkis: CS558 Network Security History 1993 – Mosaic (“browser #1”) 1994 – Netscape Browser released SSL v1 design complete – never released SSL v2 released in Navigator 1.1 Badly broken (bad seeds for PRNG) 1995 – Explorer released PCT (MS), SSL v3 (Netscape) 1996-1999 – TLS 1.0 1999 – WTLS 5/1/2018 Gene Itkis: CS558 Network Security

Gene Itkis: CS558 Network Security Architecture Application (HTTP) SSL TCP IP 5/1/2018 Gene Itkis: CS558 Network Security

Alternative architectures Separate Layer Over TCP: SSL Over IP: IPSec Application-Specific SHTTP Parallel Kerberos; Kerberos with TLS? 5/1/2018 Gene Itkis: CS558 Network Security

Gene Itkis: CS558 Network Security SSL choices Connection-oriented SSL, TLS do not support UDP But WTLS does No non-repudiation But signatures are used for AKE “Only protects the pipe” Attacks are mounted on data before and after “the pipe” 5/1/2018 Gene Itkis: CS558 Network Security

Gene Itkis: CS558 Network Security SSL security services Server authentication Client authentication is optional Encryption Message integrity 5/1/2018 Gene Itkis: CS558 Network Security

Gene Itkis: CS558 Network Security SSL phases Handshake Set protocol details Authenticate server Establish keys Data transfer 5/1/2018 Gene Itkis: CS558 Network Security

Gene Itkis: CS558 Network Security Handshake ClientHello Supported options ServerHello Options to be used ServerCertificate (ServerKeyExchange) ServerHelloDone ClientKeyExchange Finished (sent by client) 5/1/2018 Gene Itkis: CS558 Network Security