SlideShare une entreprise Scribd logo
1  sur  36
Computer Security: Principles and
Practice
EECS710: Information Security
Professor Hossein Saiedian
Fall 2014
Chapter 22: Internet Security Protocols
and Standards
2
S/MIME (Secure/Multipurpose Internet
Mail Extensions)
• Security enhancement to MIME email
– Original Internet RFC822 email was text only
– MIME provided support for varying content types and
multi-part messages
– With encoding of binary data to textual form
– S/MIME added security enhancements
• Have S/MIME support (e.g., signed or
encryption) in many mail agents
– MS Outlook, Mozilla, Mac Mail etc
3
MIME
Types
4
S/MIME Types
5
S/MIME Functions
• Enveloped data
– encrypted content and associated keys
• Signed data
– digital signature (hash code of msg encrypted with sender’s
private key)
– encrypted msg (random sym key later encrypted)
– can be view by recipient with S/MIME
• Clear-signed data
– cleartext message + encoded signed digest
• Signed & enveloped data
– nesting of signed & encrypted entities
6
S/MIME Functions (Summary)
7
S/MIME Process
8
S/MIME Cryptographic Algorithms
• Digital signatures: DSS & RSA
• Hash functions: SHA-1 & MD5
• Session key encryption: ElGamal & RSA
• Message encryption: AES, 3DES, etc
• MAC: HMAC with SHA-1
• Must map binary values to printable ASCII
– use radix-64 or base64 mapping
10
DomainKeys Identified Mail (DKIM)
• Specification of cryptographically signing e-mail
messages permitting a signing domain to claim
responsibility for a message in the mail stream
• Proposed Internet Standard: DomainKeys
Identified Mail (DKIM) Signatures
• Widely adopted by a range of e-mail providers
11
Internet E-Mail Architecture
12
DKIM Purpose
• Email authentication between hosts
• Transparent to the user
• Each email is signed by the private key of the
administrative domain
• To authenticate that the message comes from
the claimed administrative domain
• Mail delivery agent (MDA) does the verification
13
Domain Keys Identified Mail (DKIM)
Deployment
14
DKIM vs S/MIME
• S/MIME depends on both sender and receiver
users using S/MIME (many users however don’t
user it)
• S/MIME only signs the contents; email header
may be compromised
• DKIM is not implemented in client programs
(MUAs) – transparent to the users
• DKIM applies to all emails
• DKIM allows good senders to prove they sent a
particular message
15
Internet Security Protocols and
Standards
• Secure Sockets Layer (SSL) and the follow-up
Transport Layer Security (TLS)
– SSL: a general-purpose set of protocols; relies on TCP
– Full generality as part of the a protocol suite
(transparent to apps)
– Embedded in a specific app (e.g., IE)
• IPv4 and IPv6 (IP level security)
• HTTPS
16
Secure Sockets Layer (SSL)
• Transport layer security service
– originally developed by Netscape
– version 3 designed with public input
• Subsequently became Internet standard Transport
Layer Security (TLS)
• Use TCP to provide a reliable end-to-end service
• May be provided in underlying protocol suite
transparent to apps)
• Or embedded in specific packages (WWW browsers)
17
SSL Protocol Stack
SSL Rec Protocol provides
Basic sec services to the above
Protocols (eg, HTTP):
• HTTP provides xfer svc for Web
client/server interactions
• Other three protocols are used
in management of SSL
18
Two Important SSL
Concepts
• SSL session: an association
between a client and a
server created by the
Handshake protocol
• SSL connection: a transport
layer, peer-to-peer, short-
live connection
– Every connection is
associated with one session
19
SSL Record Protocol Services
• Confidentiality
– The Handshake Protocol defines a shared secret key
for symmetric encryption of SSL payloads
– AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza,
RC4-40, RC4-128
– Message is compressed before encryption
• Message integrity
– the Handshake Protocol also defines a shared secret
key to form a msg authentication code (MAC)
20
SSL Record Protocol Operation
Steps:
1. Fragment the message
2. Compress (optional)
3. Compute and add MAC
4. Encrypt msg and MAC
5. Append SSL header
21
SSL Record Protocol Operation
22
SSL Record Protocol Operation
25
SSL Handshake Protocol
• Allows server & client to:
– authenticate each other
– to negotiate encryption & MAC algorithms
– to negotiate cryptographic keys to be used
• Comprises a series of messages in phases
1. Establish Security Capabilities
2. Server Authentication and Key Exchange
3. Client Authentication and Key Exchange
4. Finish
26
SSL Handshake Protocol
27
SSL Handshake Protocol
28
SSL Handshake
Protocol
29
IP Security (IPSec)
• various application security mechanisms
– eg. S/MIME, PGP, Kerberos, SSL/HTTPS
• security concerns cross protocol layers
• hence would like security implemented by the
network for all applications
• authentication & encryption security features
included in next-generation IPv6
• also usable in existing IPv4
30
IPSec
• general IP Security mechanisms
• provides
– authentication
– confidentiality
– key management
• applicable to use over LANs, across public &
private WANs, & for the Internet
31
IPSec Uses
32
Benefits of IPSec
• when implemented in a firewall/router, it
provides strong security to all traffic crossing
the perimeter
– no overhead of security-related processing
• is below transport layer, hence transparent to
applications
• can be transparent to end users; no need to
train users on sec mechanisms such as keys
• secures routing architecture
33
IP Security Architecture
• mandatory in IPv6, optional in IPv4
• have three main functions:
– Authentication Header (AH): auth only
– Encapsulating Security Payload (ESP): auth & encryption
– Key Exchange function: manual/auto exchange of keys
• Example: VPNs want both auth and encryption
– hence usually use ESP
• specification is quite complex
– numerous RFC’s 2401/2402/2406/2408
34
Security Associations (SA)
• a one-way relationship between sender &
receiver that affords security for traffic flow
• defined by 3 parameters:
– Security Parameters Index (SPI): and index in AH and
ESP; tells receiver which SA to select
– IP Destination Address: destination endpoint of a SA
– Security Protocol Identifier
• has a number of other parameters
– seq no, AH & EH info, lifetime etc
35
Authentication Header (AH)
• provides support for data integrity &
authentication of IP packets
– end system/router can authenticate user/app
– prevents address spoofing attacks by tracking
sequence numbers
• based on use of a MAC
– HMAC-MD5-96 or HMAC-SHA-1-96
• parties must share a secret key
36
Authentication Header
Type of the header following this header; size of the AH; for future use;
SA; increasing seq counter; authentication data, e.g., MAC or
integrity check value
37
Encapsulating Security Payload (ESP)
38
Key Management
• handles key generation & distribution
• typically need 2 pairs of keys
– 2 per direction for AH & ESP
• manual key management
– sysadmin manually configures every system
• automated key management
– automated system for on demand creation of keys
for SA’s in large systems
– has Oakley & ISAKMP elements
39
Summary
• Secure Sockets Layer (SSL) / Transport Layer
Security (TLS)
• IPv4 and IPv6 Security
• S/MIME (Secure/Multipurpose Internet Mail
Extension)

Contenu connexe

Similaire à ch22.ppt

BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
limsh
 

Similaire à ch22.ppt (20)

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.ppt
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Ip sec
Ip secIp sec
Ip sec
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
Email sec11
Email sec11Email sec11
Email sec11
 
Web Security
Web SecurityWeb Security
Web Security
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Unit08
Unit08Unit08
Unit08
 
Transportsec
TransportsecTransportsec
Transportsec
 
Email security
Email securityEmail security
Email security
 
Ch15
Ch15Ch15
Ch15
 

Plus de ImXaib

ERD introduction in databases model.pptx
ERD introduction in databases model.pptxERD introduction in databases model.pptx
ERD introduction in databases model.pptx
ImXaib
 
SDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptxSDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptx
ImXaib
 
terminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptxterminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptx
ImXaib
 
What is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptxWhat is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptx
ImXaib
 
Grid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTXGrid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTX
ImXaib
 
lecture2.ppt
lecture2.pptlecture2.ppt
lecture2.ppt
ImXaib
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
ImXaib
 
mis9_ch08_ppt.ppt
mis9_ch08_ppt.pptmis9_ch08_ppt.ppt
mis9_ch08_ppt.ppt
ImXaib
 
rooster-ipsecindepth.ppt
rooster-ipsecindepth.pptrooster-ipsecindepth.ppt
rooster-ipsecindepth.ppt
ImXaib
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
ImXaib
 
Database schema architecture.ppt
Database schema architecture.pptDatabase schema architecture.ppt
Database schema architecture.ppt
ImXaib
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
Trends in DM.pptx
Trends in DM.pptxTrends in DM.pptx
Trends in DM.pptx
ImXaib
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
ImXaib
 
dm15-visualization-data-mining.ppt
dm15-visualization-data-mining.pptdm15-visualization-data-mining.ppt
dm15-visualization-data-mining.ppt
ImXaib
 

Plus de ImXaib (20)

ERD introduction in databases model.pptx
ERD introduction in databases model.pptxERD introduction in databases model.pptx
ERD introduction in databases model.pptx
 
SDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptxSDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptx
 
terminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptxterminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptx
 
What is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptxWhat is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptx
 
Grid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTXGrid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTX
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
4966709.ppt
4966709.ppt4966709.ppt
4966709.ppt
 
lecture2.ppt
lecture2.pptlecture2.ppt
lecture2.ppt
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
ch12.ppt
ch12.pptch12.ppt
ch12.ppt
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
 
mis9_ch08_ppt.ppt
mis9_ch08_ppt.pptmis9_ch08_ppt.ppt
mis9_ch08_ppt.ppt
 
rooster-ipsecindepth.ppt
rooster-ipsecindepth.pptrooster-ipsecindepth.ppt
rooster-ipsecindepth.ppt
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Database schema architecture.ppt
Database schema architecture.pptDatabase schema architecture.ppt
Database schema architecture.ppt
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Trends in DM.pptx
Trends in DM.pptxTrends in DM.pptx
Trends in DM.pptx
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
 
dm15-visualization-data-mining.ppt
dm15-visualization-data-mining.pptdm15-visualization-data-mining.ppt
dm15-visualization-data-mining.ppt
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

ch22.ppt

  • 1. Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 22: Internet Security Protocols and Standards
  • 2. 2 S/MIME (Secure/Multipurpose Internet Mail Extensions) • Security enhancement to MIME email – Original Internet RFC822 email was text only – MIME provided support for varying content types and multi-part messages – With encoding of binary data to textual form – S/MIME added security enhancements • Have S/MIME support (e.g., signed or encryption) in many mail agents – MS Outlook, Mozilla, Mac Mail etc
  • 5. 5 S/MIME Functions • Enveloped data – encrypted content and associated keys • Signed data – digital signature (hash code of msg encrypted with sender’s private key) – encrypted msg (random sym key later encrypted) – can be view by recipient with S/MIME • Clear-signed data – cleartext message + encoded signed digest • Signed & enveloped data – nesting of signed & encrypted entities
  • 8. 8 S/MIME Cryptographic Algorithms • Digital signatures: DSS & RSA • Hash functions: SHA-1 & MD5 • Session key encryption: ElGamal & RSA • Message encryption: AES, 3DES, etc • MAC: HMAC with SHA-1 • Must map binary values to printable ASCII – use radix-64 or base64 mapping
  • 9. 10 DomainKeys Identified Mail (DKIM) • Specification of cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream • Proposed Internet Standard: DomainKeys Identified Mail (DKIM) Signatures • Widely adopted by a range of e-mail providers
  • 11. 12 DKIM Purpose • Email authentication between hosts • Transparent to the user • Each email is signed by the private key of the administrative domain • To authenticate that the message comes from the claimed administrative domain • Mail delivery agent (MDA) does the verification
  • 12. 13 Domain Keys Identified Mail (DKIM) Deployment
  • 13. 14 DKIM vs S/MIME • S/MIME depends on both sender and receiver users using S/MIME (many users however don’t user it) • S/MIME only signs the contents; email header may be compromised • DKIM is not implemented in client programs (MUAs) – transparent to the users • DKIM applies to all emails • DKIM allows good senders to prove they sent a particular message
  • 14. 15 Internet Security Protocols and Standards • Secure Sockets Layer (SSL) and the follow-up Transport Layer Security (TLS) – SSL: a general-purpose set of protocols; relies on TCP – Full generality as part of the a protocol suite (transparent to apps) – Embedded in a specific app (e.g., IE) • IPv4 and IPv6 (IP level security) • HTTPS
  • 15. 16 Secure Sockets Layer (SSL) • Transport layer security service – originally developed by Netscape – version 3 designed with public input • Subsequently became Internet standard Transport Layer Security (TLS) • Use TCP to provide a reliable end-to-end service • May be provided in underlying protocol suite transparent to apps) • Or embedded in specific packages (WWW browsers)
  • 16. 17 SSL Protocol Stack SSL Rec Protocol provides Basic sec services to the above Protocols (eg, HTTP): • HTTP provides xfer svc for Web client/server interactions • Other three protocols are used in management of SSL
  • 17. 18 Two Important SSL Concepts • SSL session: an association between a client and a server created by the Handshake protocol • SSL connection: a transport layer, peer-to-peer, short- live connection – Every connection is associated with one session
  • 18. 19 SSL Record Protocol Services • Confidentiality – The Handshake Protocol defines a shared secret key for symmetric encryption of SSL payloads – AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128 – Message is compressed before encryption • Message integrity – the Handshake Protocol also defines a shared secret key to form a msg authentication code (MAC)
  • 19. 20 SSL Record Protocol Operation Steps: 1. Fragment the message 2. Compress (optional) 3. Compute and add MAC 4. Encrypt msg and MAC 5. Append SSL header
  • 22. 25 SSL Handshake Protocol • Allows server & client to: – authenticate each other – to negotiate encryption & MAC algorithms – to negotiate cryptographic keys to be used • Comprises a series of messages in phases 1. Establish Security Capabilities 2. Server Authentication and Key Exchange 3. Client Authentication and Key Exchange 4. Finish
  • 26. 29 IP Security (IPSec) • various application security mechanisms – eg. S/MIME, PGP, Kerberos, SSL/HTTPS • security concerns cross protocol layers • hence would like security implemented by the network for all applications • authentication & encryption security features included in next-generation IPv6 • also usable in existing IPv4
  • 27. 30 IPSec • general IP Security mechanisms • provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet
  • 29. 32 Benefits of IPSec • when implemented in a firewall/router, it provides strong security to all traffic crossing the perimeter – no overhead of security-related processing • is below transport layer, hence transparent to applications • can be transparent to end users; no need to train users on sec mechanisms such as keys • secures routing architecture
  • 30. 33 IP Security Architecture • mandatory in IPv6, optional in IPv4 • have three main functions: – Authentication Header (AH): auth only – Encapsulating Security Payload (ESP): auth & encryption – Key Exchange function: manual/auto exchange of keys • Example: VPNs want both auth and encryption – hence usually use ESP • specification is quite complex – numerous RFC’s 2401/2402/2406/2408
  • 31. 34 Security Associations (SA) • a one-way relationship between sender & receiver that affords security for traffic flow • defined by 3 parameters: – Security Parameters Index (SPI): and index in AH and ESP; tells receiver which SA to select – IP Destination Address: destination endpoint of a SA – Security Protocol Identifier • has a number of other parameters – seq no, AH & EH info, lifetime etc
  • 32. 35 Authentication Header (AH) • provides support for data integrity & authentication of IP packets – end system/router can authenticate user/app – prevents address spoofing attacks by tracking sequence numbers • based on use of a MAC – HMAC-MD5-96 or HMAC-SHA-1-96 • parties must share a secret key
  • 33. 36 Authentication Header Type of the header following this header; size of the AH; for future use; SA; increasing seq counter; authentication data, e.g., MAC or integrity check value
  • 35. 38 Key Management • handles key generation & distribution • typically need 2 pairs of keys – 2 per direction for AH & ESP • manual key management – sysadmin manually configures every system • automated key management – automated system for on demand creation of keys for SA’s in large systems – has Oakley & ISAKMP elements
  • 36. 39 Summary • Secure Sockets Layer (SSL) / Transport Layer Security (TLS) • IPv4 and IPv6 Security • S/MIME (Secure/Multipurpose Internet Mail Extension)