SSL Technology White Paper

Size: px
Start display at page:

Download "SSL Technology White Paper"

Transcription

1 SSL Technology White Paper Keywords: SSL, PKI, MAC Abstract: SSL provides secure connection services for TCP-based application layer protocols by using data encryption, identity authentication, and integrity authentication mechanisms. This document presents the background, security mechanism, operation process, and application scenarios of SSL. Acronyms: Acronym Full spelling AES CA DES HTTPS MAC Advanced Encryption Standard Certificate Authority Data Encryption Standard Hypertext Transfer Protocol Secure Message Authentication Code MD5 Message Digest 5 PKI RSA SHA SSL VPN Public Key Infrastructure Rivest Shamir and Adleman Secure Hash Algorithm Secure Sockets Layer Virtual Private Network Hangzhou H3C Technologies Co., Ltd. 1/13

2 Table of Contents Overview 3 Background 3 Benefits 3 Security Mechanisms of SSL 3 Confidentiality 3 Identity Authentication 4 Message Integrity Verification 5 Using an Asymmetric Algorithm to Secure the Key 6 Using PKI to Guarantee the Authenticity of Public Keys 6 Operation of SSL 7 SSL Protocol Stack 7 SSL Handshake Process 8 Handshake Process with Identity Authentication of only the Server 8 Handshake Process with Identity Authentication of Both Ends 10 Handshake Process When Reusing a Session 11 Application Scenarios 12 HTTPS 12 SSL VPN 12 References 13 Hangzhou H3C Technologies Co., Ltd. 2/13

3 Overview Background Web-based applications such as E-business and online banking facilitate people s daily life greatly. For these applications that need to support online trading, communication security is a key problem. However, the traditional Hypertext Transfer Protocol (HTTP) provides no security mechanism; it transmits data in plain text, does not support identity authentication, and cannot prevent data from being tampered with during transmission. This is where the Secure Sockets Layer (SSL) comes in. SSL was first proposed by Netscape. Integrated with data encryption, identity authentication, and message integrity authentication mechanisms, it can ensure the security of data transmitted on the network. SSL can provide security connection service for HTTP, improving the security of the World Wide Web (WWW) dramatically. Benefits SSL features these benefits: Higher security. Integrated with data encryption, identity authentication, and message integrity authentication mechanisms, it can ensure the security of data transmitted on the network. Support for various application layer protocols. SSL was originally designed to solve the security problem on the Web. However, as it resides between the transport layer and the application layer, it can provide security service for any application layer protocol that employs TCP connections. Simple to deploy. Currently, SSL has become a global standard for identity authentication between the browser and server. It has been integrated into most browsers, such as IE, Netscape, and Firefox. This means that almost every computer with a browser supports SSL connections, without requiring any extra client software. Security Mechanisms of SSL SSL provides these security mechanisms: Confidentiality: SSL uses a symmetric encryption algorithm to encrypt data to be transmitted. Identity authentication: SSL supports certificate-based identity authentication of the server and client by using the digital signatures, with the authentication of the client being optional. Message integrity verification: SSL uses Message Authentication Code (MAC) algorithms to verify message integrity. Confidentiality Data being transmitted on the network may be intercepted and stolen easily. SSL can ensure the confidentiality of data in transit by establishing an encrypted channel between the communication peers. With this encrypted channel, the data sender encrypts the data to be transferred by using an encryption algorithm and an encryption key before sending the data, while the receiver uses the Hangzhou H3C Technologies Co., Ltd. 3/13

4 corresponding decryption algorithm and decryption key to retrieve the data. No one else can get the key and retrieve the data. This ensures the confidentiality of the data. Encryption/decryption algorithms fall into two categories: Symmetric algorithm: The encryption and decryption processes use the same key. Asymmetric algorithm: The encryption and decryption processes use different keys of a key pair. A key pair consists of two keys, one is the public key, and the other is the private key, which is kept secret by the user. Data encrypted with the public key or private key of a key pair can only be decrypted by using the private key or public key or the key pair. Compared with asymmetric algorithms, symmetric algorithms feature high speed and usually apply to scenarios where large amounts of data need to be encrypted, for example, when all packets need to be encrypted. Asymmetric algorithms are usually used for digital signature and encryption of a little information. An SSL encrypted channel uses a symmetric encryption algorithm to encrypt data. Currently, SSL supports these algorithms: Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and Advanced Encryption Standard (AES). These algorithms can effectively prevent data from being eavesdropped. A symmetric algorithm uses the same key for encryption and decryption. Therefore, before data being encrypted by a symmetric algorithm, the communication peers must obtain the same key. For key deployment of a symmetric algorithm, refer to Using an Asymmetric Algorithm to Secure the Key. Identity Authentication An application such as E-business or online banking must ensure the authenticity of Web servers, so as to prevent information from being eavesdropped. SSL employs digital signatures to authenticate the identities of communication peers. An asymmetric encryption algorithm can be used to implement digital signature. As data encrypted with a private key can be decrypted only with the corresponding public key, you can determine the identity of a sender by checking whether the encrypted data of the sender can be decrypted by using the sender s public key. And the process that a sender encrypts the data with the private key is just like putting a signature to the data. For example, Alice encrypts a fixed piece of information with her private key and then sends the encrypted information to Bob. Bob decrypts the information with Alice s public key. If Bob obtains the same fixed piece of information, he assumes that the information is from Alice. The SSL client must authenticate the identity of the SSL server, while whether the SSL server authenticates the identity of the SSL client depends on the SSL server. For the identity authentication process between the SSL client and server, refer to SSL Handshake Process. When digital signature is used for identity authentication, it is required to make sure that the public key of an entity is really that of the entity. This is to avoid the situation when an illegal user pretends to be a legal user and communicates with the authenticator. As shown in Figure 1, Cindy, pretending to be Bob, sends her public key to Alice and uses her private key to encrypt a fixed piece of information and sends the resulting information to Alice. Alice decrypts the information with the public key of Bob, which is actually that of Cindy, and assumes that she is communicating the Bob. SSL Hangzhou H3C Technologies Co., Ltd. 4/13

5 uses the Public Key Infrastructure (PKI) to ensure the authenticity of a public key. For details, refer to Using PKI to Guarantee the Authenticity of Public Keys. Figure 1 Forged public key Message Integrity Verification SSL can use MD5- and SHA-based MAC algorithms to verify the integrity of a message. A MAC algorithm functions with the participation of a key. Using a key, it can transform a piece of data of any length to data of a fixed length. Figure 2 shows the operation process of a MAC algorithm. The sender uses the MAC algorithm and the key to compute the MAC value of a message, suffixes the MAC value to the message and sends the resulting packet to the receiver. The receiver uses the same MAC algorithm and key to compute the MAC value and compares it with the received MAC value. If the two are the same, no change has occurred to the packet. Otherwise, the receiver assumes that the packet has been tampered with and will drop the packet. Figure 2 MAC algorithm MAC algorithms verify the integrity of a message based on these features: Any change to the message will make the generated message of a fixed length different, and comparing the MAC values will find that the message has been altered. A MAC algorithm needs the participation of a shared key. This is to ensure that illegal users without the key cannot figure out the correct MAC value after changing the message. As MAC algorithms require that the communication peers have the same key, you need to deploy the same key to the peers in advance. For the way to deploy such a key, refer to Using an Asymmetric Algorithm to Secure the Key. Hangzhou H3C Technologies Co., Ltd. 5/13

6 Using an Asymmetric Algorithm to Secure the Key SSL Technology White Paper Symmetric encryption algorithms and MAC algorithms require that the communication peers have the same key. Therefore, for an encrypted channel to be established between two peers or to verify the message integrity, you need to deploy the same key to the two peers in advance. SSL employs an asymmetric algorithm to encrypt the key to be exchanged, so as to prevent the key from being obtained by any third party. As shown in Figure 3, the SSL client (for example, the Web browser) uses the public key of the SSL server (for example, the Web server) to encrypt the key and then sends the encrypted key to the SSL server. Only the SSL server that has the corresponding private key can decrypt the information and obtain the key. SSL usually uses the Rivest Shamir and Adleman (RSA) algorithm to encrypt the key to be transmitted. Figure 3 key exchange In fact, the key that the SSL client sends to the SSL server is only the premaster secret, which will not be used to encrypt data or compute the MAC value directly. The SSL client and server will use the premaster secret to compute the master secret, and then use the master secret to generate the keys for the symmetric algorithm and MAC algorithm to use. The previous description simplifies the process for convenience of understanding. An algorithm for key exchange is called a key exchange algorithm. When asymmetric algorithm RSA is used for key exchange, it is also called a key exchange algorithm. Before using an asymmetric algorithm to encrypt the key, a sender needs to obtain the public key of the receiver and ensure the authenticity of the public key. Otherwise, the key may be intercepted by illegal users, as shown in Figure 1. Cindy, pretending to be Bob, sends her public key to Alice. Alice uses the public key of Cindy to encrypt the data to be sent to Bob. As Bob does not have the corresponding private key, he cannot decrypt the data; while Cindy has the corresponding private key and therefore can obtain the data. SSL uses the Public Key Infrastructure (PKI) to ensure the authenticity of a public key. For details, refer to Using PKI to Guarantee the Authenticity of Public Keys. Using PKI to Guarantee the Authenticity of Public Keys PKI uses digital certificates to publish the public keys of users and provides a mechanism for verifying the authenticity of the public keys. A digital certificate is a file that contains the public key Hangzhou H3C Technologies Co., Ltd. 6/13

7 and identity information of a user. It is used to prove the binding between the user and the public key. A digital certificate is signed and issued by a certificate authority (CA). A CA is responsible for the authenticity of the digital certificates that it issues. Before the SSL client sends the key to the SSL server, the SSL server needs to obtain a certificate from the CA and send it to the SSL client. The SSL client can verify the authenticity of the certificate through PKI. If the certificate really belongs to the SSL server, the SSL client uses the public key in the certificate to encrypt the key and sends the encrypted key to the SSL server. Before the SSL client authenticates the identity of the server, the server needs to obtain a certificate from the CA and send it to the SSL client. The client can verify the authenticity of the certificate through PKI. If the certificate really belongs to the SSL server, the client will use the public key in the certificate to authenticate the identity of the server. The similar is true for the scenario where the SSL server needs to authenticate the identity of the client. Operation of SSL SSL Protocol Stack Figure 4 SSL protocol stack As shown in Figure 4, the SSL protocol is between the transport layer and application layer. It can provide security for all application protocols based on TCP connections. The SSL protocol stack consists of two layers of protocols: the SSL record protocol at the lower layer and the SSL handshake protocol, change cipher spec protocol, and alert protocol at the upper layer. SSL handshake protocol: As a very important part of the SSL protocol stack, it is responsible for negotiating the cipher suite to be used during communication (including the encryption algorithm, key exchange algorithm, and MAC algorithm), exchanging the key between the server and client, and implementing identity authentication of the server and client. SSL change cipher spec protocol: Used for notification between a client and the server that the subsequent packets are to be protected and transmitted based on the newly negotiated cipher suite and key. SSL alert protocol: Allowing a client and the server to send alert messages to each other. An alert message contains the alert severity level and a description. SSL record protocol: Fragmenting data to be transmitted, computing and adding MAC value to the data, and encrypting the data before transmitting it to the peer end. Hangzhou H3C Technologies Co., Ltd. 7/13

8 SSL Handshake Process Through the SSL handshake protocol, an SSL client and server negotiate the parameters to be used and establish a session between them. A session consists of a set of parameters, including the session ID, peer certificate, cipher suite, and master secret. All data of a session will use the master secret and cipher suite of the session for encryption and MAC computing. The SSL handshake process may vary, depending on the situations. The following gives the SSL handshake processes in three situations: Handshake Process with Identity Authentication of only the Server Handshake Process with Identity Authentication of Both Ends Handshake Process When Reusing a Session Handshake Process with Identity Authentication of only the Server Figure 5 Handshake process with identity authentication of only the server As shown in Figure 5, if only identity authentication of the server is required, the SSL handshake process is as follows: 1) The SSL client sends a Client Hello message to the SSL server, telling the server such information as the SSL version, encryption algorithms, key exchange algorithms, and MAC algorithms that it supports. 2) The SSL server determines the SSL version and cipher suite to be used for the communication, and notifies the SSL client through a Server Hello message. If the server allows the SSL client to reuse the session for communications that may occur later, the server will assign a session ID to the session and notify the client of the session ID through the same Server Hello message. 3) The SSL server sends its local certificate to the client through a Certificate message. 4) The SSL server sends a Server Hello Done message to the client, informing the client that the version and cipher suite negotiation is over and the key exchange process will start. Hangzhou H3C Technologies Co., Ltd. 8/13

9 5) The SSL client obtains the public key of the SSL server from the received certificate and verifies the authenticity of the SSL server s certificate. If server s certificate is OK, the client generates a premaster secret randomly, uses the server s public key to encrypt the premaster secret, and then sends the premaster secret to the server through a Client Key Exchange message. 6) The SSL client sends a Change Cipher Spec message to the server, informing the server that the subsequent packets will use the negotiated key and cipher suite for encryption and MAC computing. 7) The SSL client computes the hash value of the exchanged handshake messages (except for the Change Cipher Spec message), processes the hash value with the negotiated key and cipher suite (that is, computes and suffixes the MAC value and performs encryption), and then sends a Finished message to the SSL server. The SSL server uses the same means to compute the hash value and compares the hash value with that received from the client. If the two matches, the MAC authentication succeeds, which means that the key and cipher suite negotiation succeeds. 8) Similarly, the SSL server sends a Change Cipher Spec message to the client, informing the client that the subsequent packets will use the negotiated key and cipher suite for encryption and MAC computing. 9) The SSL server computes the hash value of the exchanged handshake messages, processes the hash value with the negotiated key and cipher suite (that is, computes and suffixes the MAC value and performs encryption), and then sends a Finished message to the SSL client. The SSL client uses the same means to compute the hash value and compares the hash value with that received from the server. If the two matches, the MAC authentication succeeds, which means that the key and cipher suite negotiation succeeds. Upon receiving the Finished message from the SSL server, the SSL client tries to decrypt the message, and if it can do so successfully, it assumes that the SSL server is really the server that it wants to communicate with, that is, identity authentication of the server succeeds. This is because only the intended SSL server has the private key and can decrypt the Client Key Exchange message and obtain the premaster secret. The Change Cipher Spec message belongs to the SSL change cipher spec protocol. All the other messages exchanged during the handshake process belong to the SSL handshake protocol and are referred to as SSL handshake messages. Computing the hash value means using a hash algorithm (MD5 or SHA) to transform data of variable length to data of a fixed length. Hangzhou H3C Technologies Co., Ltd. 9/13

10 Handshake Process with Identity Authentication of Both Ends Figure 6 Handshake process with identity authentication of both ends Identity authentication of the SSL client is optional and depends on the SSL server. As shown in Figure 6, if the SSL server wants to authenticate the identity of the SSL client, the SSL server and client will go through the steps described in Handshake Process with Identity Authentication of only the Server as well as the steps in blue in Figure 6: 1) The SSL server sends a Certificate Request message to the SSL client to ask for the client s certificate. 2) The SSL client sends its certificate to the SSL server through a Certificate message. The SSL server verifies the authenticity of the certificate. 3) The SSL client computes the hash value of the exchanged handshake messages, uses its private key to encrypt the value, and then sends the value to the SSL server through a Certificate Verify message. 4) The SSL server computes the hash value of the exchanged handshake messages and master secret, uses the client s public key to decrypt the hash value received from the client, and compares the two hash values. If the two matches, identity authentication of the SSL client succeeds. Hangzhou H3C Technologies Co., Ltd. 10/13

11 Handshake Process When Reusing a Session Figure 7 Handshake process when reusing a session During the session parameter negotiation and session establishment process, an asymmetric encryption algorithm is used to encrypt the key and authenticate the identity of the peers. This means a large amount of computation and a lot of system resource consumption. To simplify the SSL handshake process, SSL allows reusing a negotiated session. The details are as follows: 1) The SSL client sends a Client Hello message to the server, setting the session ID to the ID of the session that it wants to reuse. 2) If the SSL server allows reuse of the session, it sends a Server Hello message carrying the same session ID to the client. Thus, the SSL client and server can reuse the key and cipher suite of a negotiated session, rather than go through all the trouble to renegotiate one. 3) The SSL client sends a Change Cipher Spec message to the server, informing the server that the subsequent packets will use the key and cipher suite of the session for encryption and MAC computing. 4) The SSL client computes the hash value of the exchanged handshake messages, uses the key and cipher suite of the session to process the hash value, and then sends the value to the SSL server through a Finished message. This is for the SSL server to determine whether the key and cipher suite are correct. 5) Similarly, the SSL server sends a Change Cipher Spec message to the client, informing the client that the subsequent packets will use the key and cipher suite of the session for encryption and MAC computing. 6) The SSL server computes the hash value of the exchanged handshake messages, uses the key and cipher suite of the session to process the hash value, and then sends the value to the SSL client through a Finished message. This is for the SSL client to determine whether the key and cipher suite are correct. Hangzhou H3C Technologies Co., Ltd. 11/13

12 Application Scenarios HTTPS Hypertext Transfer Protocol Secure (HTTPS) is SSL connection-based HTTP. Employing the security mechanisms that SSL provides, namely the confidentiality, identity authentication, and message integrity verification mechanisms, HTTPS can guarantee the security of Web access. Therefore, HTTPS has been widely used in fields such as online banking and E-business. Figure 8 shows an application of HTTPS in an online bank. For convenience of customers, a bank provides online banking services. Customers can query their accounts and transfer money between accounts through the Web server of the bank. It is required that an SSL connection is established between a customer and the Web server of the bank to prevent the customer s information from being intercepted. Figure 8 Network diagram for HTTPS application in a online bank SSL VPN SSL VPN is another application based on SSL. SSL VPN uses the security mechanisms of SSL to allow remote users of a corporate network to access the network securely. As shown in Figure 9, SSL VPN establishes SSL connections between remote users using various access methods and the SSL VPN gateway, allowing the users to access the corporate network through various Web browsers from any place. At the same time, SSL VPN can ensure the security of the corporate network and protect the information of the corporate from being stolen. Hangzhou H3C Technologies Co., Ltd. 12/13

13 Figure 9 Network diagram for SSL VPN References draft-freier-ssl-version3-02: The SSL Protocol Version 3.0 Copyright 2009 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. The information in this document is subject to change without notice. Hangzhou H3C Technologies Co., Ltd. 13/13

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Secure Sockets Layer

Secure Sockets Layer SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated

More information

The Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption

More information

As enterprises conduct more and more

As enterprises conduct more and more Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside

More information

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Secure Socket Layer/ Transport Layer Security (SSL/TLS) Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Communication Systems SSL

Communication Systems SSL Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

Release: 1. ICANWK502A Implement secure encryption technologies

Release: 1. ICANWK502A Implement secure encryption technologies Release: 1 ICANWK502A Implement secure encryption technologies ICANWK502A Implement secure encryption technologies Modification History Release Release 1 Comments This Unit first released with ICA11 Information

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

Strong Encryption for Public Key Management through SSL

Strong Encryption for Public Key Management through SSL Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What

More information

PHOENIX: SECURE FILE TRANSFER USING SSL

PHOENIX: SECURE FILE TRANSFER USING SSL Phoenix: Secure File Transfer Using SSL 1 PHOENIX: SECURE FILE TRANSFER USING SSL ARJUN VENKATRAMAN arjun.dhanush@gmail.com Phoenix: Secure File Transfer Using SSL 2 1. INTRODUCTION TO SSL 1.1 SSL: The

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Internet Programming. Security

Internet Programming. Security Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Portal Authentication Technology White Paper

Portal Authentication Technology White Paper Portal Authentication Technology White Paper Keywords: Portal, CAMS, security, authentication Abstract: Portal authentication is also called Web authentication. It authenticates users by username and password

More information

SSL Protect your users, start with yourself

SSL Protect your users, start with yourself SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service

More information

CSC 774 -- Network Security

CSC 774 -- Network Security CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version

More information

Web Security. Mahalingam Ramkumar

Web Security. Mahalingam Ramkumar Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610 Real-Time Communication Security: SSL/TLS Guevara Noubir noubir@ccs.neu.edu CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS

More information

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Lab 7. Answer. Figure 1

Lab 7. Answer. Figure 1 Lab 7 1. For each of the first 8 Ethernet frames, specify the source of the frame (client or server), determine the number of SSL records that are included in the frame, and list the SSL record types that

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Transport Level Security

Transport Level Security Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication

More information

SECURE SOCKET LAYER PROTOCOL SIMULATION IN JAVA. A Research Project NAGENDRA KARRI

SECURE SOCKET LAYER PROTOCOL SIMULATION IN JAVA. A Research Project NAGENDRA KARRI SECURE SOCKET LAYER PROTOCOL SIMULATION IN JAVA A Research Project By NAGENDRA KARRI Submitted to the College of Graduate Studies Oregon State University in partial fulfillment of the requirements for

More information

IBM i Version 7.3. Security Digital Certificate Manager IBM

IBM i Version 7.3. Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

mod_ssl Cryptographic Techniques

mod_ssl Cryptographic Techniques mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises

More information

Key Management (Distribution and Certification) (1)

Key Management (Distribution and Certification) (1) Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem

More information

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

Security Protocols/Standards

Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity

More information

What is network security?

What is network security? Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol

More information

, ) I Transport Layer Security

, ) I Transport Layer Security Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent

More information

Introduction to Security and PIX Firewall

Introduction to Security and PIX Firewall Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network

More information

Instructions on TLS/SSL Certificates on Yealink Phones

Instructions on TLS/SSL Certificates on Yealink Phones Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Chapter 7: Network security

Chapter 7: Network security Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

More information

Secure Socket Layer. Security Threat Classifications

Secure Socket Layer. Security Threat Classifications Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

SSL Handshake Analysis

SSL Handshake Analysis SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. nalini.elkins@insidethestack.com Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com

More information

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Lecture 7: Transport Level Security SSL/TLS. Course Admin Lecture 7: Transport Level Security SSL/TLS CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lecture by Tony Barnard Course Admin HW/Lab 1 Graded; scores posted; to be

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Some solutions commonly used in order to guarantee a certain level of safety and security are:

Some solutions commonly used in order to guarantee a certain level of safety and security are: 1. SSL UNICAPT32 1.1 Introduction The following introduction contains large excerpts from the «TCP/IP Tutorial and Technical Overview IBM Redbook. Readers already familiar with SSL may directly go to section

More information

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.

More information

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols INFS 766 Internet Security s Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

IPS Attack Protection Configuration Example

IPS Attack Protection Configuration Example IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306 Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project

More information

GT 6.0 GSI C Security: Key Concepts

GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the

More information

SSL Secure Socket Layer

SSL Secure Socket Layer ??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake

More information