8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter
8.4 Securing 4 Layers in Protocol Stack Application Layer ▫ Transport Layer ▫ SSL Protocol Network Layer ▫ IPSec Link Layer ▫ IEEE
8.4 Securing Why have multiple-layer security? To provide user level security It is easier to deploy security services at higher layers in protocol stack
8.4 Securing 4 Security Features Confidentiality Sender Authentication Message Integrity Receiver Authentication
8.4 Securing Confidentiality Public Key Cryptography ▫ RSA Symmetric Key Technology ▫ DES or AES
8.4 Securing Sender Authentication & Message Integrity Without Confidentiality ▫ Digital Signatures and Message Digests
8.4 Securing Sender Authentication & Message Integrity With Confidentiality
8.4 Securing Pretty Good Privacy (PGP) ---BEGIN PGP SIGNED MESSAGE--- Hash: SHA1 Bob: My husband is out of town tonight. Passionately yours, Alice ---BEGIN PGP SIGNATURE--- Version: PGP 5.0 Charset: noconv yhHJRHhGJGhgg/12EpJ+lo8gE4vB3mqJhFEvZP9t6n7G6m5Gw2 ---END PGP SIGNATURE BEGIN PGP MESSAGE--- Version: PGP 5.0 u4g9fh0KJF03hjdoe./jehfiwoefwehg032rskjclnvbiol -----END PGP MESSAGE
8.5 Securing TCP Connections: SSL SSL Secure Sockets Layer ▫ Enhanced version of TCP Transport Layer Security ▫ Slightly modified version of SSL (version 3) Https
8.5 Securing TCP Connections: SSL Why SSL? Provides confidentiality Provides data integrity Provides server authentication
8.5 Securing TCP Connections: SSL Three Phases Handshake Key Derivation Data Transfer (Connection Closure)
8.5 Securing TCP Connections: SSL SSL Handshake Server authentication ▫ Master Secret (MS) ▫ Encrypted Master Secret (EMS)
8.5 Securing TCP Connections: SSL SSL Key Derivation Generate Four Keys: ▫ E B = encryption ▫ M B = MAC ▫ E A = encryption ▫ M A = MAC
8.5 Securing TCP Connections: SSL SSL Data Transfer Break data stream into records: DataMAC VersionLengthType Encrypted with E B
8.5 Securing TCP Connections: SSL Real SSL Server authentication Negotiation: agree on crypto algorithms Establish keys Client authentication (optional)
8.5 Securing TCP Connections: SSL Closing Connection TCP FIN Type field
Bibliography [1] J. Kurose and K. Ross, Computer Networking: A top-down approach, 5 th edition. New York: Pearson Education, Inc., [2] M.S.Bhiogade, “Secure Socket Layer”, in InSITE - “Where Parallels Intersect,” June 2002, pp [3]A. Weaver, “How Things Work Secure Sockets Layer,” in Computer – Innovative Technology for Computing Professionals, April [4] R. Bazile and O. Wong, “Pretty Good Privacy Network Security and Cryptography, CS682,” November 4, [5] D.V. Bhatt, S. Schulze, G.P. Hancke, L. Horvath, “Secure Internet access to gateway using secure socket layer,” in Virtual Environments, Human- Computer Interfaces and Measurement Systems, July 2003, pp [6] S. Garfinkel and G. Spafford, Web Security and Commerce. Sebastopol, CA : O'Reilly & Associates, Inc., [7] A. Levi and Ç. K. Koç, “Risks in Security,” in Inside Risks, [8] M. Sunner, “ Security,” in Network Security, Volume 2005, Issue 12, December 2005, pp. 4-7.