WTLS (Wireless Transport Layer Security) Youngho Choung

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Web security: SSL and TLS
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Lecture 6: Web security: SSL
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Web Security (SSL / TLS)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
December 2006Prof. Reuven Aviv, SSL1 Web Security with SSL Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
Cryptography and Network Security Chapter 17
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 9 Wenbing Zhao Department of Electrical and Computer Engineering.
0 SSL3.0 / TLS1.0 Secure Communication over Insecure Line.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 8 Web Security.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
December 2008Prof. Reuven Aviv, SSL1 Web Security with SSL Network Security Prof. Reuven Aviv King Mongkut’s University of Technology Faculty of information.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 3: Securing TCP.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Network Security David Lazăr.
SSL (TLS) Part 2 Generating the Premaster and Master Secrets + Encryption.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
1 Secure Socket Layer Originally by Yu Yang and Lilly Wang Originally by Yu Yang and Lilly Wang Modified by T. A. Yang Modified by T. A. Yang.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Secure Sockets Layer (SSL)
Visit for more Learning Resources
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Cryptography and Network Security
Security at the Transport Layer: SSL and TLS
SSL Protocol Figures used in the presentation
Transport Layer Security (TLS)
Unit 8 Network Security.
Presentation transcript:

WTLS (Wireless Transport Layer Security) Youngho Choung

Youngho Choung Contents Why we need WTLS? What is WTLS? What is TLS (SSL3.0) ? WTLS Functions Security Algorithm WTLS specifications Other Technologies

Youngho Choung Why we need WTLS ? (1/2) What can we do through the Cell Phone?  Communication  Using Internet  E-commerce  On-line banking  Trading Stock  Electric Cash  Electric ID  Watching movie, take a picture … etc …

Youngho Choung Why we need WTLS ? (2/2) Environment problems We need Security Solutions

Youngho Choung What is WTLS ? (1/2)

Youngho Choung What is WTLS ? (1/2)

Youngho Choung What is TLS (SSL3.0) ? (1/3) TLS stand for Transaction Layer Security SSL stand for Secure Socket Layer Customer 웹 브 라 우 저 인터넷 Internet Shopping Mall 불안전한 Unreliable Channel 암호화구간

Youngho Choung What is TLS (SSL3.0) ? (2/3) Application data Fragment Compress Add MAC Encrypt Append SSL record header SSL Handshake Protocol SSL Change Cipher Spec Protocol SSL Alert Protocol HTTP SSL Record Protocol TCP IP

Youngho Choung What is TLS (SSL3.0) ? (3/3) Handshake protocol  K ey establishment algorithm Diffie-Hellman, RSA, Fortezza  Certificate RSA, DSS,Fortezza Record protocol  MAC algorithm MD5, SHA-1  Encryption algorithm RC2, RC4, DES, Triple DES, IDEA,Fortezza

Youngho Choung WTLS Functions Data Integrity Privacy Authentication DoS (Denial of Service) protection Optional

Youngho Choung Security Algorithm Hash Function Dyejsmldmnf mdfnmd,sdd fnfnfnlkfekkfe ekfkjefjefelfee Any Length Plain Text Hash Function Fix length Encrypted Text MD5, MD4, Hash, SHA-1, etc

Youngho Choung Security Algorithm Block Cipher (1)Diagram M E C (Message) (Ciphertext) K (Key) M, C, K : nbit blocks Examples ( in bits) {128,192,256} AES 64 DES KCM

Youngho Choung Security Algorithm Block Cipher (2)Encryption : Combination ofSubstitution& Permutation Decryption : Inverse of Encryption (3) Classical ciphers a.Permutation Ciphers b.Substitution Cipher : Caesar Cipher

Youngho Choung Security Algorithm Public Key Key distribution is difficult  Tow Communicants already share a key or have the use of a key distribution center Characteristic  (public) encryption key ≠ (private) decryption key

Youngho Choung Security Algorithm Public Key

Youngho Choung WTLS Specifications (1/5) Handshaking protocol  Full handshaking protocol  Abbreviated handshaking protocol  Optimized handshaking protocol Alert protocol Change Cipher spec protocol Record protocol

Youngho Choung WTLS Specifications Full handshaking

Youngho Choung WTLS Specifications Abbreviated handshaking

Youngho Choung WTLS Specifications Optimized full handshaking [ChangCipherSpec] Finished Application Data ServerHello Certificate [ChangeCipherSpec] Finished

Youngho Choung WTLS Specifications (4/5) Alert protocol Change Cipher spec protocol

Youngho Choung WTLS Specifications (5/5) Record Protocol

Youngho Choung Let ’ s talk about …… later.. Let ’ s talk about …… later.. WALS(Wireless Application Layer Security) WPKI(Wireless Public-Key Infrastructure) WIM(WAP Identity Module References