Encryption, SSL and Certificates BY JOSHUA COX AND RACHAEL MEAD.

Slides:



Advertisements
Similar presentations
Z39.50 and Cryptography ZIG July 13 th 2000 Poul Henrik Jørgensen, DBC
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
6/3/2015topic1 Web Security Qiang Yang Simon Fraser University Thanks: Francis Lau (HKU)
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Chapter 8 Web Security.
Cryptography 101 Frank Hecker
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
CSCI 6962: Server-side Design and Programming
Supporting Technologies III: Security 11/16 Lecture Notes.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Can SSL and TOR be intercepted? Secure Socket Layer.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
Digital Signatures and Digital Certificates Monil Adhikari.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Web Security.
The Secure Sockets Layer (SSL) Protocol
TOPIC: HTTPS (Security protocol)
Unit 8 Network Security.
Presentation transcript:

Encryption, SSL and Certificates BY JOSHUA COX AND RACHAEL MEAD

Outline  Cryptography  Encryption  SSL  Overview  Keys  Statistics  Certificates  Explanation of certificates  MITM attacks with keys  Disadvantages

Encryption  Type of Cryptography  The practice and study of techniques for secure communication in the presence of third parties.  The process of encoding messages so that only authorized parties can read it.  Use of encryption keys to encrypt and decrypt the message.  Used in military communications in the past. Primarily used for protecting computer data nowadays.

SSL What is SSL?  SSL stands for Secure Sockets Layer and it is a standard security technology for establishing an encrypted link between a server and a client  First SSL Certificate was created in 1994 by Netscape Communications  SSL Certificate issuers are called Certificate Authority or CA’s  SSL allows sensitive information such as credit card numbers and social security numbers to be transmitted securely  Required by the Payment Card Industry (PCI) to have an SSL Certificate  Main component of SSL Certificates are keys which are the Public and Private key

SSL Keys  Public Key –Encryption  Private Key –Decryption  Session Key- Temporary key shared by sever and browser

SSL  Asymmetric encryption or public-key cryptography uses a separate key for encryption and decryption  Only the intended receiver can decrypt the message  Asymmetric keys are typically 1024 or 2048 bits.  2048 bit contains 617 digits of encryption code. 14 Billion years to crack. VideoVideo Asymmetric Encryption

SSL  Symmetric encryption uses a single key to both encrypt and decrypt data.  Both the sender and the receiver need the same key to communicate  Symmetric key sizes are typically 128 or 256 bits—the larger the key size, the harder the key is to crack Symmetric Encryption

SSL Symmetric vs. Asymmetric  Symmetric keys have a major disadvantage because the same key is used for symmetric encryption and decryption.  Asymmetric encryption doesn’t have this problem.  As long as you keep your private key secret, no one can decrypt your messages.  Only the person with the private key can decrypt it, which makes Asymmetric stronger.

SSL SSL Handshake/ Example  Connection between Browser and Server is known as the “SSL Handshake”.  Class activity!

SSL Statistics  55.9% of websites do not use SSL Certificate  11.3% use self signed certificates  Out of the 32.8% who use SSL Certificate Authorities.  38.3% use Symantec  Owns Verisign, and Geotrust among others Sources: w3techs.com, sslshopper

Certificates Certificates and What They do?  Electronic Credentials  Think of a passport or an ID  Help to prevent MITM attacks  Help preserve data integrity

Certificates Man in the Middle Attacks  Someone is intercepting and modifying communications  Make new public keys and can eavesdrop on messages.  Capable of impersonating official websites Suppose Alice is your grandmother and Bob is her banker. Then Mallory is intercepting their messages.

Certificates How to Solve MITM Attacks  Certificates wrap the keys and other identifying information, and encrypt them.  Certificate is signed by a trusted Certificate Authority.  This is what allows you to host a secure website (https)  Certificate Authorities range from 60$ a year to 500$ a year  Source: whichssl.comwhichssl.com  Can make your own Certificate, is not trusted.  Certificate Example: tldp.orgtldp.org

Disadvantages of SSL and Certificates  Certificate Authorities security can be breached  Diginotar. In July 2011 a man was able to make a near perfect google replica. Diginotar certificates are now banned from most browsers.  Trustwave, an international Certificate Authority sold the trusted root certificates to unknown client. There is reason to believe Trustwave is not the only CA to do this.  HeartBleed Bug  heartbleed.com heartbleed.com  There are Patented interception taps: patentpatent  Governments, and Vendors use interception taps.