SSL/TLS.

Slides:



Advertisements
Similar presentations
SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Advertisements

Web security: SSL and TLS
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Transport Layer Security (TLS) Bill Burr November 2, 2001.
Web Security (SSL / TLS)
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 8, 2013.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 9 Wenbing Zhao Department of Electrical and Computer Engineering.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Transport-level and Web Security (SSL / TLS, SSH)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
SSL (TLS) Part 2 Generating the Premaster and Master Secrets + Encryption.
A Cross-Protocol Attack on the TLSProtocol Nikos Mavrogiannopoulos, Frederik Vercauteren, VesselinVelichkov, Bart Preneel. Presented by: Nitin Subramanian.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
8-1 CSE 4707/5850 Network Security (2) SSL/TLS. 8-2 Think about Google or YouTube  Desired properties  Indeed the other side is Google or YouTube server.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Computer and Network Security
Executive Director and Endowed Chair
The Secure Sockets Layer (SSL) Protocol
Web Security CS-431.
Cryptography CS 555 Topic 34: SSL/TLS.
Reviews Rocky K. C. Chang 20 April 2007.
Cryptography and Network Security
Cryptography EN Fall 2016 Lecture Notes.
Cryptography Why Cryptography Symmetric Encryption
Secure Sockets Layer (SSL)
CSCE 715: Network Systems Security
SSL Implementation Guide
BINF 711 Amr El Mougy Sherif Ismail
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS, Part II
NET 536 Network Security Networks and Communication Department
CSE 4095 Transport Layer Security TLS
Cryptography and Network Security
Cryptography and Network Security Chapter 16
CS 465 TLS Last Updated: Oct 31, 2017.
SSL – Secure Socket Layer and TLS – Transport Layer Security
Secure Web Application-SSL
Virtual Private Networks (VPN)
Cryptography and Network Security
Web Security (TRANSPORT-LEVEL SECURITY)
Assignment #4 – Solutions
SSL (Secure Socket Layer)
Chapter 7 WEB Security.
Web Security (TRANSPORT-LEVEL SECURITY)
Lecture 8: Transport Level Security – SSL/TLS
Security at the Transport Layer: SSL and TLS
TLS and DLP Behind the green lock.
The Secure Sockets Layer (SSL) Protocol
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Chapter 7 WEB Security.
Lecture 10: Network Security.
Transport Layer Security (TLS)
Security at the Transport Layer
Cryptography and Network Security
Integrated Security System
TLS Encryption and Decryption
A General Introduction to Modern Cryptography
Presentation transcript:

SSL/TLS

What Ciphers to Use A TLS session negotiates four ciphers Cipher used for authentication of server and optionally client (RSA DSS- Digital Signature Algorithm(really rare)/ EC-DSA) Cipher used for key exchange (RSA, E-DHE Ephemeral (Key is temporal) Cipher used for symmetric confidentiality (RC4, AES, DES) Cipher used for integrity (HMAC-MD5, HMAC-SHA) Negotiated in a 5-step session initiations protocol

TLS Cipher Negotiation Client Server Supported ciphers, client random

TLS Cipher Negotiation Client Server Supported ciphers, client random Chosen ciphers, server random, certificate

TLS Cipher Negotiation Client Server Supported ciphers, client random Chosen ciphers, server random, SSL TLS certificate & Public key

TLS Cipher Negotiation Client Server Supported ciphers, client random Chosen ciphers, server random, SSL TLS certificate & Public key Pre-master session key

Session Key

TLS Cipher Negotiation Client Server Supported ciphers, client random Chosen ciphers, server random, SSL TLS certificate & Public key Pre-master session key Message after this are encrypted

Computer The Master Secret from the premaster secret Premaster secret did not take into account anything from the server. Open to replay attacks: master_secret = PRF(pre_master_secret, "master secret", ClientHello.random + ServerHello.random) The “master secret” is simply a string whose ASCII bytes (e.g. “6d 61 73 74 65 72 …”) TLS's PRF is created by splitting the secret into two halves and using one half to generate data with P_MD5 and the other half to generate data with P_SHA-1, then exclusive-or'ing the outputs of these two expansion functions together.