17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.

Slides:



Advertisements
Similar presentations
ISA 662 SSL Prof. Ravi Sandhu. 2 © Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later.
Advertisements

SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.5 Transport Layer Security.
Cryptography and Network Security Chapter 16
Web security: SSL and TLS
Lecture 6: Web security: SSL
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
SMUCSE 5349/49 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Cryptography and Network Security
Secure Sockets. Overview of Lecture We covered an overview of authenticated key exchange protocols In this lecture we will –Look at issues related to.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Web Security (SSL / TLS)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
December 2006Prof. Reuven Aviv, SSL1 Web Security with SSL Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Cryptography and Network Security Chapter 17
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
0 SSL3.0 / TLS1.0 Secure Communication over Insecure Line.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Chapter 8 Web Security.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
CN8814: Network Security1 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) TLS (SSL-VPN)
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
December 2008Prof. Reuven Aviv, SSL1 Web Security with SSL Network Security Prof. Reuven Aviv King Mongkut’s University of Technology Faculty of information.
Web Security Network Systems Security
SSL (TLS) Part 2 Generating the Premaster and Master Secrets + Encryption.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Cryptography and Network Security
UNIT.4 IP Security.
CSCE 715: Network Systems Security
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS, Part II
Cryptography and Network Security Chapter 16
Virtual Private Networks (VPN)
SSL (Secure Socket Layer)
Chapter 7 WEB Security.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Security at the Transport Layer: SSL and TLS
CSCE 815 Network Security Lecture 16
SSL Protocol Figures used in the presentation
Chapter 7 WEB Security.
Transport Layer Security (TLS)
Presentation transcript:

17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS

17.2 Objectives ❏ To discuss the need for security services at the transport layer of the Internet model ❏ To discuss the general architecture of SSL ❏ To discuss the general architecture of TLS ❏ To compare and contrast SSL and TLS Chapter 17

17.3 Figure 17.1 Location of SSL and TLS in the Internet model 17 Continued

SSL ARCHITECTURE SSL is designed to provide security and compression services to data generated from the application layer Services Key Exchange Algorithms Encryption/Decryption Alogrithms Hash Algorithms Cipher Suite Compression Algorithms Crypography Parameter Generation Session and Connections Topics discussed in this section:

Services Fragmentation Compression Message Integrity Confidentiality Framing

Key Exchange Algorithms Figure 17.2 Key-exchange methods

17.7 Null Continued There is no key exchange in this method. No pre- master secret is established between the client and the server. Both client and server need to know the value of the pre-master secret. Note

17.8 RSA Continued Figure 17.3 RSA key exchange; server public key

17.9 Anonymous Diffie-Hellman Continued Figure 17.4 Anonymous Diffie-Hellman key exchange

17.10 Ephemeral Diffie-Hellman key exchange Continued Figure 17.5 Ephemeral Diffie-Hellman key exchange

17.11 Fixed Diffie-Hellman Continued Another solution is the fixed Diffie-Hellman method. All entities in a group can prepare fixed Diffie- Hellman parameters (g and p). Fortezza Fortezza is a registered trademark of the U.S. National Security Agency (NSA). It is a family of security protocols developed for the Defense Department.

17.12 Figure 17.6 Encryption/decryption algorithms Encryption/Decryption Algorithms

Continued The NULL category simply defines the lack of an encryption/decryption algorithm. NULL Two RC algorithms are defined in stream mode. One RC algorithm is defined in block mode. All DES algorithms are defined in block mode. Stream RC Block RC DES

Continued The IDEA algorithm defined in block mode is IDEA_CBC, with a 128-bit key. The one Fortezza algorithm defined in block mode is FORTEZZA_CBC. IDEA Fortezza

17.15 Figure 17.7 Hash algorithms for message integrity Hash Algorithm

Continued The two parties may decline to use an algorithm. In this case, there is no hash function and the message is not authenticated. NULL The two parties may choose MD5 as the hash algorithm. In this case, a 128-key MD5 hash algorithm is used. The two parties may choose SHA as the hash algorithm. In this case, a 160-bit SHA-1 hash algorithm is used. MD5 SHA-1

Cipher Suite The combination of key exchange, hash, and encryption algorithms defines a cipher suite for each SSL session.

Continued Table 17.1 SSL cipher suite list

Compression Algorithms Compression is optional in SSLv3. No specific compression algorithm is defined for SSLv3. Therefore, the default compression method is NULL.

Cryptographic Parameter Generation Figure 17.8 Calculation of master secret from pre-master secret

17.21 Figure 17.9 Calculation of key material from master secret Continued

17.22 Figure Extractions of cryptographic secrets from key material Continued

Sessions and Connections In a session, one party has the role of a client and the other the role of a server; in a connection, both parties have equal roles, they are peers. Note

Continued Figure A session and connections

Continued Session State Table 17.2 Session state parameters

Continued Connection State Table 17.3 Connection state parameters

Continued The client and the server have six different cryptography secrets: three read secrets and three write secrets. The read secrets for the client are the same as the write secrets for the server and vice versa. Note

Four Protocols We have discussed the idea of SSL without showing how SSL accomplishes its tasks. SSL defines four protocols in two layers, as shown in Figure Handshake Protocol ChangeCipher Spec Protocol Alert Protocol Record Protocol Topics discussed in this section:

17.29 Figure Four SSL protocols Continued

Handshake Protocol Figure Handshake Protocol

17.31 Figure Phase I of Handshake Protocol Continued

Continued After Phase I, the client and server know the following: ❏ The version of SSL ❏ The algorithms for key exchange, message authentication, and encryption ❏ The compression method ❏ The two random numbers for key generation Note

17.33 Figure Phase II of Handshake Protocol Continued

Continued After Phase II, ❏ The server is authenticated to the client. ❏ The client knows the public key of the server if required. Note

17.35 Figure Four cases in Phase II Continued

17.36 Figure Phase III of Handshake Protocol Continued

Continued After Phase III, ❏ The client is authenticated for the server. ❏ Both the client and the server know the pre-master secret. Note

17.38 Figure Four cases in Phase III Continued

17.39 Figure Phase IV of Handshake Protocol Continued

Continued After Phase IV, the client and server are ready to exchange data. Note

ChangeCipherSpec Protocol Figure Movement of parameters from pending state to active state

Alert Protocol Table 17.4 Alerts defined for SSL

Record Protocol Figure Processing done by the Record Protocol

17.44 Figure Calculation of MAC Continued

SSL MESSAGE FORMATS As we have discussed, messages from three protocols and data from the application layer are encapsulated in the Record Protocol messages ChangeCipherSpec Protocol Alert Protocol Handshake Protocol Application Data Topics discussed in this section:

17.46 Figure Record Protocol general header 17.3 Continued

17.47 Figure ChangeCipherSpec message ChangeCipherSpec Protocol

17.48 Figure Alert message Alert Protocol

17.49 Figure Generic header for Handshake Protocol Handshake Protocol

Continued Table 17.5 Types of Handshake messages

17.51 Figure Virtual tributary types Continued

17.52 Figure ClientHello message Continued

17.53 Figure ServerHello message Continued

17.54 Figure Certificate message Continued

17.55 Figure ServerKeyExchange message Continued

17.56 Figure CertificateRequest message Continued

17.57 Figure ServerHelloDone message Continued

17.58 Figure CertificateVerify message Continued

17.59 Figure Hash calculation for CertificateVerify message Continued

17.60 Figure ClientKeyExchange message Continued

17.61 Figure Finished message Continued

17.62 Figure Hash calculation for Finished message Continued

Application Data Figure Record Protocol message for application data

Transport Layer Security (TLS) The Transport Layer Security (TLS) protocol is the IETF standard version of the SSL protocol. The two are very similar, with slight differences Version Cipher Suite Generation of Cryptographic Secrets Alert Protocol Handshake Protocol Record Protocol Topics discussed in this section:

Version The first difference is the version number (major and minor). The current version of SSL is 3.0; the current version of TLS is 1.0. In other words, SSLv3.0 is compatible with TLSv1.0.

Cipher Suite Another minor difference between SSL and TLS is the lack of support for the Fortezza method. TLS does not support Fortezza for key exchange or for encryption/decryption. Table 17.6 shows the cipher suite list for TLS (without export entries).

Continued Table 17.6 Cipher Suite for TLS

Generation of Cryptographic Secrets Figure Data-expansion function

17.69 Figure PRF Continued

17.70 Figure Master secret generation Continued

17.71 Figure Key material generation Continued

Alert Protocol TLS supports all of the alerts defined in SSL except for NoCertificate. TLS also adds some new ones to the list. Table 17.7 shows the full list of alerts supported by TLS.

Continued Table 17.7 Alerts defined for TLS

Handshake Protocol Figure Hash for CertificateVerify message in TLS

17.75 Figure Hash for Finished message in TLS Continued

Record Protocol Figure HMAC for TLS