Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.5 Transport Layer Security.
Advertisements

Cryptography and Network Security Chapter 16
Web security: SSL and TLS
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Lecture 6: Web security: SSL
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 22: Internet Security Protocols and.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Web Security (SSL / TLS)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Cryptography and Network Security
Lecture 22 Internet Security Protocols and Standards
Cryptography and Network Security Chapter 17
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Chapter 8 Web Security.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Transport-level and Web Security (SSL / TLS, SSH)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Web Security Network Systems Security
Tunneling and Securing TCP Services Nathan Green.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
IP Securty 1. Overview 2. Architecture 3. Authentication Header 4. Encapsulating Security Payload 5. Combining security Associations 6. Internet Key Exchange.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Computer and Network Security
CSCI 555 Adv Computer Security
Cryptography and Network Security
Dr.Bremnavas Ismail Mohideen
UNIT.4 IP Security.
Subject: Information and network Security Sem: VIII Staff name: Annapoorani, Suganthi Lecture slides by Lawrie Brown for “Cryptography and Network Security”,
CSCE 715: Network Systems Security
BINF 711 Amr El Mougy Sherif Ismail
Public-Key Cryptography
Cryptography and Network Security
Cryptography and Network Security Chapter 16
Cryptography and Network Security Chapter 16
Cryptography and Network Security
SSL (Secure Socket Layer)
Cryptography and Network Security Chapter 16
Cryptography and Network Security
Presentation transcript:

Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)

 Web now widely used by business, government, individuals  but Internet & Web are vulnerable, and have a variety of threats ◦ integrity ◦ confidentiality ◦ denial of service ◦ authentication  need added security mechanisms

 In terms of passive and active attacks  In terms of location of the threat ◦ Web server ◦ Web browser ◦ Network traffic between browser and server

 transport layer security service  originally developed by Netscape  version 3 designed with public input  subsequently became Internet standard known as TLS (Transport Layer Security)  uses TCP to provide a reliable end-to-end service  SSL has two layers of protocols

 SSL connection ◦ a transient, peer-to-peer, communications link ◦ associated with 1 SSL session  SSL session ◦ an association between client & server ◦ created by the Handshake Protocol ◦ define a set of cryptographic parameters ◦ may be shared by multiple SSL connections÷

 confidentiality ◦ using symmetric encryption with a shared secret key defined by Handshake Protocol  AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4- 40, RC4-128 ◦ message is compressed before encryption  message integrity ◦ using a MAC with shared secret key ◦ similar to HMAC but with different padding

 one of 3 SSL specific protocols which use the SSL Record protocol  a single message  causes pending state to become current  hence updating the cipher suite in use

 conveys SSL-related alerts to peer entity  severity  warning or fatal  specific alert  fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter  warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown  compressed & encrypted like all SSL data

 allows server & client to: ◦ authenticate each other ◦ to negotiate encryption & MAC algorithms ◦ to negotiate cryptographic keys to be used  comprises a series of messages in phases 1.Establish Security Capabilities 2.Server Authentication and Key Exchange 3.Client Authentication and Key Exchange 4.Finish

 master secret creation ◦ a one-time 48-byte value ◦ generated using secure key exchange (RSA / Diffie- Hellman) and then hashing info  generation of cryptographic parameters ◦ client write MAC secret, a server write MAC secret, a client write key, a server write key, a client write IV, and a server write IV ◦ generated by hashing master secret

 IETF standard RFC 5246 similar to SSLv3  with minor differences ◦ in record format version number ◦ uses HMAC for MAC ◦ a pseudo-random function expands secrets  based on HMAC using SHA-1 or MD5 ◦ has additional alert codes ◦ some changes in supported ciphers ◦ changes in certificate types & negotiations ◦ changes in crypto computations & padding

 HTTPS (HTTP over SSL) ◦ combination of HTTP & SSL/TLS to secure communications between browser & server  documented in RFC2818  no fundamental change using either SSL or TLS  use URL rather than ◦ and port 443 rather than 80  encrypts ◦ URL, document contents, form data, cookies, HTTP headers

 connection initiation ◦ TLS handshake then HTTP request(s)  connection closure ◦ have “Connection: close” in HTTP record ◦ TLS level exchange close_notify alerts ◦ can then close TCP connection ◦ must handle TCP close before alert exchange sent or completed

 protocol for secure network communications ◦ designed to be simple & inexpensive  SSH1 provided secure remote logon facility ◦ replace TELNET & other insecure schemes ◦ also has more general client/server capability  SSH2 fixes a number of security flaws ◦ documented in RFCs 4250 through 4256  SSH clients & servers are widely available  method of choice for remote login/ X tunnels

 server authentication occurs at transport layer, based on server/host key pair(s) ◦ server authentication requires clients to know public host keys in advance  packet exchange ◦ establish TCP connection ◦ can then exchange data  identification string exchange, algorithm negotiation, key exchange, end of key exchange, service request ◦ using specified packet format

 authenticates client to server  three message types: ◦ SSH_MSG_USERAUTH_REQUEST ◦ SSH_MSG_USERAUTH_FAILURE ◦ SSH_MSG_USERAUTH_SUCCESS  authentication methods used ◦ public-key, password, host-based

 runs on SSH Transport Layer Protocol  assumes secure authentication connection  used for multiple logical channels ◦ SSH communications use separate channels ◦ either side can open with unique id number ◦ flow controlled ◦ have three stages:  opening a channel, data transfer, closing a channel ◦ four types:  session, x11, forwarded-tcpip, direct-tcpip.

 convert insecure TCP connection into a secure SSH connection ◦ SSH Transport Layer Protocol establishes a TCP connection between SSH client & server ◦ client traffic redirected to local SSH, travels via tunnel, then remote SSH delivers to server  supports two types of port forwarding ◦ local forwarding – hijacks selected traffic ◦ remote forwarding – client acts for server

 have considered: ◦ need for web security ◦ SSL/TLS transport layer security protocols ◦ HTTPS ◦ secure shell (SSH)