SSL Certificates for Secure Websites

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Grid Computing Basics From the perspective of security or An Introduction to Certificates.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Public Key Management and X.509 Certificates
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Electronic Transaction Security (E-Commerce)
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Public Key Encryption An example of how a bank might accomplish encryption.
CSCI 6962: Server-side Design and Programming
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Secure Electronic Transaction (SET)
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Masud Hasan Secue VS Hushmail Project 2.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SSL Certificates for Secure Websites Dan Roberts Kent Network Users Group Wednesday, 17 March 2004.
Digital Signatures and Digital Certificates Monil Adhikari.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
TOPIC: HTTPS (Security protocol)
Setting and Upload Products
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Sockets Layer (SSL)
Chapter 8 Building the Transaction Database
How to Check if a site's connection is secure ?
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
Cryptography and Network Security
Security in ebXML Messaging
Pooja programmer,cse department
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Cryptography and Network Security
Lecture 4 - Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
A Programmer’s Guide to Secure Connections
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
CS – E-commerce Technologies – Lecture 07
Electronic Payment Security Technologies
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography and Network Security
Presentation transcript:

SSL Certificates for Secure Websites

What is SSL and what are Certificates? The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions.

How it works A browser requests a secure page (usually https://). The web server sends its public key with its certificate. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted. The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data. The web server sends back the requested html document and http data encrypted with the symmetric key. The browser decrypts the http data and html document using the symmetric key and displays the information.

Two Features of SSL Website Security Encrypted data channel for privacy SSL certificate for identity verification Is the organization who it claims to be? Is this a legitimate company? How do you know that you are dealing with the right person or rather the right web site. Well, someone has taken great length (if they are serious) to ensure that the web site owners are who they claim to be. This someone, you have to implicitly trust: you have his/her certificate loaded in your browser (a root Certificate). A certificate, contains information about the owner of the certificate, like e-mail address, owner's name, certificate usage, duration of validity, resource location or Distinguished Name (DN) which includes the Common Name (CN) (web site address or e-mail address depending of the usage) and the certificate ID of the person who certifies (signs) this information. It contains also the public key and finally a hash to ensure that the certificate has not been tampered with. As you made the choice to trust the person who signs this certificate, therefore you also trust this certificate. This is a certificate trust tree or certificate path. Usually your browser or application has already loaded the root certificate of well known Certification Authorities (CA) or root CA Certificates. The CA maintains a list of all signed certificates as well as a list of revoked certificates. A certificate is insecure until it is signed, as only a signed certificate cannot be modified. You can sign a certificate using itself, it is called a self signed certificate. All root CA certificates are self signed. As You may have noticed, the certificate contains the reference to the issuer, the public key of the owner of this certificate, the dates of validity of this certificate and the signature of the certificate to ensure this certificate hasen't been tampered with. The certificate does not contain the private key as it should never be transmitted in any form whatsoever. This certificate has all the elements to send an encrypted message to the owner (using the public key) or to verify a message signed by the author of this certificate.

Website with CA-signed SSL Certificate “I am wfs.kent.edu.. you can verify my identity with VeriSign.” Through your browser’s pre-established trust relationship with VeriSign, you automatically trust anyone who presents one of their certificates.

Website with Self-signed SSL Certificate “I am webmail.kent.edu.. you can verify my identity with webmail.kent.edu” Since there is no pre-existing trust relationship with webmail.kent.edu in your browser, a security alert message appears.

Self-signed SSL Certificates Free and unlimited supply Only trust relationship between users and server already exists Use for: Internal development Intranet applications

Self-signed SSL Certificates Kent has its own self-signing Certification Authority (CA) at http://cert.kent.edu Installed on growing number of campus PCs Certificate signing requests can be submitted to Greg Dykes or Dan Roberts

CA-signed SSL Certificates Expensive (VeriSign $250-$400/cert per yr) Useful when trust is not a given Allows user to verify your identity Eliminates warning message Use for: Public-facing web sites Transactions involving commerce and/or exchange of personal information

When Can You Use a Self-Signed Certificate? You can also use self-signed certificates for situations that require privacy, but people might not be as concerned about. For example: Username and password forms Collecting personal (non-financial) information On forms where the only users are people who know and trust you

If You're Doing Ecommerce You Need a Signed Certificate If you're asking them to input their credit card or Paypal information, then you really need a signed certificate. Most people trust the signed certificates and won't do business over an HTTPS server without one. It's just a cost of doing business.

Alternative to VeriSign GeoTrust Trusted root certification authority Same pre-established trust as VeriSign Managed PKI services with certificate request processing tools for supporting constituents Less cost (less than $150/cert per year) Quantity and multi-year discounts available Website: http://www.geotrust.com

GeoTrust’s CA certificate GeoTrust’s CA certificate has 99.9% browser penetration, and appears in your computer’s Trusted Root Certification Authority container as “Equifax”

References [1] Dan Roberts, SSL Certificates for Secure Websites [2] http://www.tldp.org/HOWTO/SSL-Certificates-HOWTO/x64.html