Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi



Similar documents
CRYPTOGRAPHY IN NETWORK SECURITY

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Chapter 7 Transport-Level Security

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Transport Layer Security Protocols

Network Security Essentials Chapter 5

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Communication Security for Applications

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Communication Systems SSL

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Overview. SSL Cryptography Overview CHAPTER 1

An Introduction to Cryptography as Applied to the Smart Grid

mod_ssl Cryptographic Techniques

CSC Network Security

CSC 474 Information Systems Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Web Security Considerations

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Transport Level Security

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cornerstones of Security

Security Protocols/Standards

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Secure web transactions system

How To Understand And Understand The Security Of A Key Infrastructure

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

ms-help://ms.technet.2005mar.1033/winnetsv/tnoffline/prodtechnol/winnetsv/plan/ssl...

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

, ) I Transport Layer Security

DRAFT Standard Statement Encryption

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

SECURE SOCKET LAYER PROTOCOL SIMULATION IN JAVA. A Research Project NAGENDRA KARRI

Savitribai Phule Pune University

ERserver. iseries. Secure Sockets Layer (SSL)

Secure Socket Layer. Security Threat Classifications

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Chapter 17. Transport-Level Security

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

ERserver. iseries. Securing applications with SSL

Lukasz Pater CMMS Administrator and Developer

SBClient SSL. Ehab AbuShmais

Lecture 9: Application of Cryptography

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

SECURE SOCKETS LAYER (SSL)

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Secure Sockets Layer

Three attacks in SSL protocol and their solutions

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

CS549: Cryptography and Network Security

T Cryptography and Data Security

Lecture 9 - Network Security TDTS (ht1)

Chapter 10. Network Security

Introduction to Cryptography

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

What is network security?

SSL Protect your users, start with yourself

Some solutions commonly used in order to guarantee a certain level of safety and security are:

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

SSL Secure Socket Layer

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

CSE/EE 461 Lecture 23

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

As enterprises conduct more and more

Lecture 10: Communications Security

Table of Contents. Bibliografische Informationen digitalisiert durch

SSL A discussion of the Secure Socket Layer

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

CRYPTOGRAPHY AS A SERVICE

SSL: Secure Socket Layer

Transcription:

Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL)

Agenda Waheed opens the presentation introduces S-HTTP Haroula introduces SSL Mohammed Compares S-HTTP to SSL Concludes the presentation

Internet Security Two basic security services Access Security Transaction Security Several mechanism to provide transaction security S-HTTP SSL PCT SET

S-HTTP Developed by the Enterprise Integration Technologies (EIT) Inc in 1994 EIT formed Terisa Systems in conjunction with RSA Data Security Terisa Systems is currently owned by spyrus Inc. Verifone?

Functionality Message oriented protocol Works at the application layer Client Machine WWW Client Crypto Smarts Encrypted and/or signed message Network Layer Secure HTTP Unencrypted Channel Server Machine WWW Server Crypto Smarts Encrypted and/or signed message Network Layer

How does it work Message Preparation: Clear text message not necessarily HTTP Receiver s cryptographic preferences and keying material Sender s cryptographic preferences and keying material

How does it work (Cont ) Message Recovery Receiver gets the S-HTTP message Receiver s stated cryptographic preferences and keying material Receiver s current cryptographic preferences and keying material Sender s previously stated cryptographic options

Security Services Provides following security services Confidentiality Non-repudiation Integrity Authentication

Currently Supported Certificates and Algorithms One-way hash functions MD2,MD5,SHA-1 Encryption Algorithms DES-CBC,3DES-CBC (2 or keys), DESX- CBC, IDEA-CFB, RC2-CBC,RC4,CDMF- CBC Digital Signature Algorithms RSA, DSS,SHS

Flexibility Provides symmetric capabilities to both server and client S-HTTP aware clients can communicate with S- HTTP oblivious server and vice-versa Allows client and server to negotiate the strength and type of cryptographic option supports PKI, Kerberos, and pre-arranged keys Works with non PKI aware clients

Current Implementations NCSA httpd was the initial reference implementation, however it is no longer supported Open Market s Secure WebServer 2.0 and earlier versions. New version 2.1 no longer supports S-HTTP SPRY Inc.'s SafteyWEB was a freely distributed version of S-HTTP server.

Why is S-HTTP disappearing? Application dependent Implementation is time consuming Netscape is used among 70% of the internet community SSL/TLS is becoming a standard

Secure Sockets Layer (SSL): Netscape Protocol Layered on top of Transmittion Control Protocol [TCP] Layered below protocols that run on top of TCP/IP[HTTP, LDAP, IMAC] Later refitted as Internet Engineering Task Force [IETF] standard Transport Layer Security [TLS] Session oriented

Security Services: Confidentiality -All data encrypted Integrity -MAC, sequence number, per session key Authentication -Public Key Cryptography

Protocol Architecture: SSL Record Protocol SSL Handshake Protocol

SSL Handshake Protocol: SSL session begins with the handshake Authentication Key exchange Initialization, synchronization of security parameters

SSL Record Protocol: Data sent via this protocol - Data compression - Data encryption - MAC to check the integrity

Cryptographic Technique Message digest algorithmes -MD5. Message Digest algorithm developed by Rivest. -SHA-1. Secure Hash Algorithm, a hash function used by the U.S. Government. Encryption algorithms -DES. Data Encryption Standard, an encryption algorithm used by the U.S. Government. -RC2 and RC4. Rivest encryption ciphers developed for RSA Data Security. -Triple-DES. DES applied three times. -IDEA.International Data Encryption Algorithm. Digital signature algorithms -DSA. Digital Signature Algorithm, part of the digital authentication standard used by the U.S. Government. -RSA. A public-key algorithm for both encryption and authentication. Developed by Rifest, Shamir, and Adleman. Key exchange algorithm -KEA. Key Exchange Algorithm, an algorithm used for key exchange by the U.S. Government. -RSA key exchange. A key-exchange algorithm for SSL based on the RSA algorithm. -SKIPJACK. A classified symmetric-key algorithm implemented in FORTEZZA-compliant hardware used by the U.S. Government. SSL comes in two strengths: 40-bit 128-bit session key.

Hardware Accelerators: Why we need cryptographic accelerators: -typical server: 12 new SSL connections/sec. -accelerator fitted: 240 new SSL connections/sec. Queuing problem. Examples: 1. Compaq AXL200 PCI Accelerator Card 2. NCipher's nfast 3. Intel Netstructure 7110 e-commerce Accelerator

Implementation: Public Domain: Servers -Open SSL -Apache-SSL -SSLeay -Mod_SSL -SSLref Commercial Domain: SSL Server Certificates: -40-bit: $125-128-bit: $300 -Renew: $100

S-HTTP vs. SSL: Functionality Performance Performance factor S-HTTP SSL Establishment latency Minimal High to medium Overhead Processing Complexity Significant depending on service provided Significant depending on service provided Not significant Not significant Server resources Stateless/Stateful Stateful

S-HTTP vs. SSL: Functionality Compatibility with other protocol Client Machine Server Machine S-HTTP Application-level Security WWW Client Crypto Smarts Encrypted and/or signed message Network Layer HTTP Unencrypted Channel WWW Server Crypto Smarts Encrypted and/or signed message Network Layer Client Machine Server Machine SSL Connection-level Security WWW Client Normal HTTP message Network Layer Crypto Smarts HTTP Encrypted Channel WWW Server Normal HTTP message Network Layer Crypto Smarts

S-HTTP vs. SSL: Functionality Compatibility with other protocol Protocol/Applications S-HTTP SSL Proxy software Limited Support Practically NO support Main Web applications/ protocols HTTP only HTTP, FTP, Telnet, NNTP Other Protocols CRL Servers, Kerberos LDAP, Kerberos*

S-HTTP vs. SSL: Functionality Negotiation Flexibility Security Services S-HTTP SSL Combination Any Combination is Allowed Certain Services are Mandatory Order Any Order is Allowed Order of Service is Enforced

S-HTTP vs. SSL: Functionality Key Exchange Mechanisms Key Exchange Mechanism S-HTTP SSL Kerberos Yes Yes* RSA Yes Yes FORTEZZA No Yes Diffie-Hellman Yes Yes KEA No Yes Inband** Yes No Out of band (prearranged) Yes * Apache SSL ** Inband: Refers to the direct assignment of an uncovered key to a symbolic name. This name could be used for later reference. No

S-HTTP vs. SSL: Security Security Services Security Service S-HTTP SSL Confidentiality Yes Yes Message Integrity Yes Yes Authentication Yes Yes Non-repudiation Yes No

S-HTTP vs. SSL: Security Vulnerability S-HTTP Traffic analysis attacks. Key-exchange algorithm rollback attack Use of in-band key exchange Use of in-band key exchange is potentially problematic Local clocks-based time stamps Denial of service attack SSL Traffic analysis attacks. Key-exchange algorithm rollback attack Weakness of some implementation of (PKCS#1) Denial of service attack

S-HTTP vs. SSL: Security Future Trend All indications show that S-HTTP seems to be loosing the battle to SSL

Conclusion No single web security solution Evaluate the security technologies based on the application needs use a combination of secure technologies Focus on more than a flawless protocol and non-technical factors. Security policy enforcement