Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Security Protocols

Similar presentations


Presentation on theme: "Internet Security Protocols"— Presentation transcript:

1 Internet Security Protocols
Chapter 8 Internet Security Protocols

2 Basic Concepts Static Web Pages
Figure 1: Static web Page Dynamic Web Pages: the contents can vary all day depending on a number of parameters Involves server-side programming. Tools to create: CGI, ASP, JSP. Figure 2: Dynamic web page Active Web Pages: Figure 3: Active web page Java applet: small program sent to the browser along the HTML page

3 Basic Concepts (cont’d)
Figure 1: Static Web Page

4 Basic Concepts (cont’d)
Figure 2: Dynamic Web Page

5 Basic Concepts (cont’d)
Figure 3: Active Web Page

6 Basic Concepts (cont’d)
ActiveX controls Difference between Java applets and ActiveX controls An applet cannot write to the client’s hard disk, but an ActiveX controls has no such restrictions An applet is downloaded with an active web page, executed inside the browser, and destroyed when the user exits that Web page, but once downloaded, an ActiveX control remains on the client computer till it is explicitly deleted. Making applet quite slow as compared to ActiveX controls.

7 Basic Concepts (cont’d)
Protocols and TCP/IP Figure 4: TCP/IP layers. Layered Organization Figure 5: Data exchange using TCP/IP layers. Figure 4: TCP/IP layers

8 Basic Concepts (cont’d)
Figure 5: Data exchange using TCP/IP layers

9 Secure Socket Layer (SSL)
An Internet protocol for secure exchange of information between a web browser and a web server. Provides 2 basic security services: Authentication Confidentiality Position of SSL in TCP/IP Protocol Suite Figure 6: Position of SSL in TCP/IP Figure 7: SSL is located between application and transport layers

10 Secure Socket Layer (SSL) (cont’d)
Figure 6: Position of SSL in TCP/IP

11 Secure Socket Layer (SSL) (cont’d)
Figure 7: SSL is located between application and transport layer

12 How SSL Works? SSL has three sub-protocols:
Handshake Protocol Record Protocol Alert Protocol The handshake protocol consists of a series of messages between the client and the server. Figure 8 shows format of the handshake protocol message.

13 Table 1: SSL handshake protocol message types
How SSL Works? (cont’d) Figure 8: Format of the handshake protocol message. Table 1: SSL handshake protocol message types

14 How SSL Works? (cont’d) The handshake protocol is made up of 4 phases as shown in Figure 9. Phase 1: Establish security capabilities Initiate a logical connection and establish the security capabilities associated with the connection. Consists of 2 messages: The client hello The server hello. Figure 10

15 Figure 9: SSL handshake phases
How SSL Works? (cont’d) Figure 9: SSL handshake phases

16 How SSL Works? (cont’d) Figure 10: Phase 1 of SSL handshake protocol: Establish security capabilities

17 How SSL Works? (cont’d) Phase 2: Server authentication and key exchange Figure 11 Phase 3: Client authentication and key exchange Figure 12 Phase 4: Finish Figure 13

18 How SSL Works? (cont’d) Help client to authenticate the server using server’s public key from the server’s certificate Optional in case of server does not send its digital certificate, server send Public Key (Optional) Server request for the client’s digital certificate Indicate to the client that server’s portion of the hello message is complete Figure 11: Phase 2 of SSL handshake protocol: Server authentication and key exchange

19 How SSL Works? (cont’d) Allow the client to send information to the server. Client creates a 48-byte pre-master secret to encrypts it with the server’s public key and sends it to the server. Figure 12: Phase 2 of SSL handshake protocol: Client authentication and key exchange

20 Figure 13: Phase 2 of SSL handshake protocol: Finish
How SSL Works? (cont’d) Figure 13: Phase 2 of SSL handshake protocol: Finish

21 How SSL Works? (cont’d) Record protocol
Provides 2 services to an SSL connection: Confidentiality: achieve by using the secret key that is defined by the handshake protocol Integrity: the handshake protocol also defines a shared secret key (MAC) that is used for assuring the message integrity.

22 Figure 14: SSL record protocol
How SSL Works? (cont’d) Figure 14: SSL record protocol

23 Figure 15 Alert protocol message format
How SSL Works? (cont’d) Alert Protocol When client or server detects an error, the detecting party sends an alert message to the other party. If the error is fatal, both the parties immediately close the SSL connection Other error, which are not severe, do not result in the termination of the connection. Severity Cause Byte 1 Byte 2 Figure 15 Alert protocol message format

24 Closing and Resuming SSL connections
Before ending their communication, the client and the server must inform each other that their side of the connection is ending. TSL (Transport Layer Security) is an IETF standardization initiative, whose goal is to come out with an Internet standard version of SSL.


Download ppt "Internet Security Protocols"

Similar presentations


Ads by Google