SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.

Slides:



Advertisements
Similar presentations
Web security: SSL and TLS
Advertisements

CP3397 ECommerce.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
Secure Socket Layer.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Cryptography and Network Security Chapter 17
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Chapter 8 Web Security.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 1: Protection and Security for Grid Computing Part 2
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Web Security Network Systems Security
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
The Secure Sockets Layer (SSL) Protocol
Cryptography and Network Security
Secure Sockets Layer (SSL)
Cryptography and Network Security
Cryptography and Network Security
SSL (Secure Socket Layer)
The Secure Sockets Layer (SSL) Protocol
Cryptography and Network Security
Presentation transcript:

SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad

Overview Brief Introduction to Public-Key Infrastructure Brief Introduction to Public-Key Infrastructure Public-keys, Certificates & Digital Signatures Public-keys, Certificates & Digital Signatures Relevance to Electronic Commerce Relevance to Electronic Commerce SSL SSL Protocol details Protocol details Cryptographic details Cryptographic details

Internet Threats Weak security in TCP/IP Weak security in TCP/IP Eavesdropping Eavesdropping Theft of valuable information Theft of valuable information Fraud Fraud Authentication Authentication Non-repudiation Non-repudiation Difficult to transform normal business practices into Internet usable form with such issues

Small Intro to PKI Problem Solved by PKI? Problem Solved by PKI? Secure communication over an insecure channel Secure communication over an insecure channel Confidentiality, authentication, non-repudation and Integrity Confidentiality, authentication, non-repudation and Integrity Asymmetric key cryptography: one (public) key encrypts, the other (private) decrypts Asymmetric key cryptography: one (public) key encrypts, the other (private) decrypts The whole technique is public-key cryptography The whole technique is public-key cryptography Solutions: RSA, El-Gamal, ECC Solutions: RSA, El-Gamal, ECC Issues with PKI Issues with PKI Verifying the ownership and security of public-keys Verifying the ownership and security of public-keys High cost of computation when sending bulk data (RSA exponentiation) High cost of computation when sending bulk data (RSA exponentiation)

Addressing Issues in PKI Digital signatures: encryption with private key, un- forgeable in real-time; verifiable with public-keys Digital signatures: encryption with private key, un- forgeable in real-time; verifiable with public-keys Other critical uses as well : non-repudiation Other critical uses as well : non-repudiation Certificates: Public-keys that are digitally signed by a trusted-third party, e.g., a certifying authority (CA) Certificates: Public-keys that are digitally signed by a trusted-third party, e.g., a certifying authority (CA) Catch22: Need the Public-key of the CA to verify! Catch22: Need the Public-key of the CA to verify! Certificate hierarchy: A method used to verify certificates issued by CAs whose public-keys are not known Certificate hierarchy: A method used to verify certificates issued by CAs whose public-keys are not known CAs sign exchange and sign each other’s public-keys securely CAs sign exchange and sign each other’s public-keys securely To reduce computational overhead PKI is generally used in as a vehicle to convey session keys To reduce computational overhead PKI is generally used in as a vehicle to convey session keys Reducing the overhead further without too many modifications to current PKI-based protocols is an open area Reducing the overhead further without too many modifications to current PKI-based protocols is an open area

X.509 v3 Certificate Attributes version (v3) serial number signature algorithm id issuer name validity period subject name subject public key info issuer unique identifier subject unique identifier CA’s signature extensions extn.a cf value extnb cf value extn.c cf value criticality flag Can include any data, including graphics (GIF), video, audio, etc. Can include any data, including graphics (GIF), video, audio, etc. Sharath Jeppu

Relevance to E-Commerce Business model in electronic world Business model in electronic world Customer shops for product using e-carts Customer shops for product using e-carts Makes a payment in credit card Makes a payment in credit card Gets confirmation of payment and delivery Gets confirmation of payment and delivery Problems Problems How to secure the credit-card information when sent over a public network like Internet? How to secure the credit-card information when sent over a public network like Internet? How to trust that the merchant has not charged more than what you ordered? How to trust that the merchant has not charged more than what you ordered? How to make the merchant is liable if the delivery is not made? How to make the merchant is liable if the delivery is not made? PKI solves these problems PKI solves these problems Need appropriate protocols that work in real-time Need appropriate protocols that work in real-time And hence, SSL & SET And hence, SSL & SET

SSL: Secure Sockets Layer Runs above TCP/IP below application layer Runs above TCP/IP below application layer Purpose Purpose Provide secure & authenticated communication between client & server Provide secure & authenticated communication between client & server Services Services Authenticates server to client Authenticates server to client Negotiation of cryptographic parameters Negotiation of cryptographic parameters Session key establishment & encrypted communication Session key establishment & encrypted communication Connection reliability is maintained via message integrity checks (message authentication codes MAC) Connection reliability is maintained via message integrity checks (message authentication codes MAC) Optional: authenticate client to server (often, not possible; password authentication is current default) Optional: authenticate client to server (often, not possible; password authentication is current default)

Protocol Details SSL Record Layer SSL Record Layer This lies below SSL handshake and encapsulates the handshake data This lies below SSL handshake and encapsulates the handshake data Alert protocol Alert protocol Closure, error, unsupported certificate etc Closure, error, unsupported certificate etc SSL Handshake SSL Handshake Sets up the connection between client and server Sets up the connection between client and server Negotiates cryptographic parameters Negotiates cryptographic parameters Provides confidentiality, authentication, reliability and integrity of data Provides confidentiality, authentication, reliability and integrity of data Change cipher Change cipher Signals change in ciphering strategies Signals change in ciphering strategies

SSL States Session State characterized by Session State characterized by session identifier session identifier peer certificate peer certificate compression method compression method cipher spec (DES, MD5 etc) cipher spec (DES, MD5 etc) master secret (shared secret between server and client) master secret (shared secret between server and client) flag (is resumable) flag (is resumable)

SSL States Connection State Connection State server and client random byte sequences server and client random byte sequences MAC secret used by server MAC secret used by server MAC secret used by client MAC secret used by client encryption key used by server encryption key used by server encryption key used by client encryption key used by client initialization vector for CBC mode initialization vector for CBC mode sequence numbers sequence numbers

SSL Handshake

References William Stallings: Cryptography and Network Security William Stallings: Cryptography and Network Security Sun Website: 10/contents.htm Sun Website: 10/contents.htm 10/contents.htm 10/contents.htm Netscape SSL Specification V3: SPEC.HTM Netscape SSL Specification V3: SPEC.HTM SPEC.HTM SPEC.HTM