Top Banner
Cryptography-Security Ch17-1 Chapter 17 – Web Security • 17.1 Web Security Considerations • 17.2 Secure Sockets Layer and Transport Layer Security
24

Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Jan 17, 2016

Download

Documents

Julian Joseph
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-1

Chapter 17 – Web Security

• 17.1 Web Security Considerations

• 17.2 Secure Sockets Layer and Transport Layer Security

Page 2: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-2

Web Security• Web now widely used by business, government,

individuals• but Internet & Web are vulnerable• have a variety of threats

– integrity– confidentiality– denial of service– authentication

• need added security mechanisms

Page 3: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-3

Web Security Requirement Threats

Threats Consequences Countermeasures

Integrity

• Modification of user data

• Trojan horse browser

• Memory• Modification

of message traffic in transmit

• Loss of information

• Compromise of machines

• Vulnerability to all other threats

• Cryptographic checksum (hash value)

Page 4: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-4

Threats (cont.)Threats Consequences Countermea

sures

Confidentiality

• Eavesdropper on the net

• Theft of info from server

• Theft of info from client

• Info about network configuration

• Info about which client talks to server

•Loss of information

•Loss of privacy

•Encryption•Web proxy

Page 5: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-5

Threats (cont.)

Threats Consequences

Countermeasures

Denial of service (DOS)

• Killing of user threats

• Flooding machine with bogus threats

• Filling up disk or memory

• Isolating machine by DNS attacks

• Disruptive• Annoying• Prevent

user from getting work done

•Hard to prevent

•Traffic control

Page 6: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-6

Threats (cont.)

Threats Consequences Countermeasures

Authentication

• impersonation of legitimate users

•Data forgery

•Misrepresentation of user

•Belief that false information is valid

•Cryptographic techniques

•Digital signature

Page 7: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-7

Put security in TCP/IP

Page 8: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-8

SSL History• SSLv2 (Secure Socket Layer)

– Netscape, 1994

• PCT (Private Communications Technology)– Microsoft, 1995– Compatible with SSLv2

• SSLv3– Netscape, 1996

• TLSv1 (Transport Layer Socket)– ETF, 1998– Minor changes with SSLv3, may be viewed as SSLv3.1

Page 9: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-9

SSL/TLS in network layers

Page 10: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-10

SSL/TLS as “secure pipe”

Page 11: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-11

Security functions• 私密性 (secrecy or privacy) :透過加密能確保資

訊的私密性。即使訊息仍然可能會被第三者攔截,但是他們無法閱讀這些資訊,因為他們沒有鑰匙可以開啟加密的資料 – Asymmetric key exchange: RSA, Diffie-Hellman, etc.– Symmetric encryption: DES, 3DES, RC4, etc.

• 完整性 (message integrity) :藉由 MAC 來確保訊息的完整性。如果在傳輸過程資料遭到竄改, 接 收 者 會 可以從 MAC 檢查出訊息遭到破壞 。– Message Integrity: MD5, SHA-1

Page 12: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-12

Security functions (cont.)• 認證 (Authentication) :經由數位憑證,確定另一

通訊端的真實身份– Server authentication– Client authentication– X.509: public-key certificate

Page 13: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-13

Protocols• Handshake Protocol

– authenticate each other– negotiate an encryption algorithm and cryptographic

keys

• Record Protocol– encapsulation of various higher level protocols

Page 14: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-14

Page 15: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-15

Steps of SSL

Page 16: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-16

Page 17: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-17

Data processing

Page 18: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-18

What cannot SSL do?• SSL 只保障資料在 Internet 上的安全,一旦資

料到達對方之後,就以明文存在。例如,以SSL 傳送信用卡卡號, server 端可以知道該信用卡卡號– SET 才可以保障 server 端的商家無法得到卡號

• SSL 並不能防止送訊息的一方否認 (denial) 曾經送過某一個訊息。

Page 19: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-19

How to use SSL• Commend: “httpshttps:www.mvdis.gov.tw”

Page 20: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-20

Page 21: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-21

Page 22: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-22

Page 23: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-23

Page 24: Cryptography-Security Ch17-1 Chapter 17 – Web Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer and Transport Layer Security.

Cryptography-Security

Ch17-24

SSL/TLS toolkits• OpenSSL

– http://www.openssl.org