Top Banner
Presented by Muhammad Luqmal NulHakim Bin Rosli Program : Bachelor Degree Of Computer Network Security Matric No : BTBL17046729 Supervisor : Dr Mohd Fadzil Bin Abdul Kadir
49

Presented by Muhammad Luqmal NulHakim Bin Rosli

Feb 17, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Presented by Muhammad Luqmal NulHakim Bin Rosli

Presented by

Muhammad Luqmal NulHakim Bin RosliProgram :

Bachelor Degree Of Computer Network SecurityMatric No :

BTBL17046729Supervisor :

Dr Mohd Fadzil Bin Abdul Kadir

Page 2: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 3: Presented by Muhammad Luqmal NulHakim Bin Rosli

In a Modern Network, the current internet environment without integrating with security mechanisms has a number of security problems and lacks effective protection over the network.

Security for network transmission become a vital aspect because majority security risks occur while conducting business on the network.

Page 4: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 5: Presented by Muhammad Luqmal NulHakim Bin Rosli

The very important things to focus on sending emails, store documents, serve information, or transmitted the data that contains sensitive, confidential and personal

information is on the security through the network.

Page 6: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 7: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 8: Presented by Muhammad Luqmal NulHakim Bin Rosli

USER SERVER

Page 9: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 10: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 11: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 12: Presented by Muhammad Luqmal NulHakim Bin Rosli

Authors/Years Title Method Advantages disadvantages

Manjuprasad, B.,

and Andhe

Dharani

2014

Simple Secure

Protocol for

Wireless Sensor

Networks.

Very Simple Secure

Protocol

• Less complex

• More secure

• More efficient

• More reliability

• Use strong

algorithm

• Have COUNTER

• Has one protocol

• Not all the web

browsers

support vssp

Efi Merdler Creating a

secure channel

Very simple

secure protocol

• More efficient

• More reliability

• Have

COUNTER

Page 13: Presented by Muhammad Luqmal NulHakim Bin Rosli

Krawczyk, Hugo,

Kenneth G.

Paterson, and

Hoeteck Wee

On the security of

the TLS protocol:

A systematic

analysis." Annual Cryptology Conference

Transport layer

Security

• Provide

communication

security

between client

and server

• More secure

compare to SSL

• Complex

protocol

Wesley Chou

2002

"Inside SSL: the

secure sockets

layer protocol

Secure socket

layer

• Less complex

• 2 protocol

(handshake and

record

protocol)

• Use simple

algorithm

• All crucial web

browsers

support SSL

• Not too secure

• Need to use

TLS for

improved

security and to

avoid

vulnerabilities.

Page 14: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 15: Presented by Muhammad Luqmal NulHakim Bin Rosli

Very simple secure protocol Secure socket layer Transport layer security

• Located above TCP/IP layer

(above application layer)

▪ Located between application

layer and transport layer❖ Located at top of transport layer

• Authentication uses Public Key Infrastructure(PKI), in example, certificate and only support server authentication

▪ 2 type of authentication which is server authentication and client authentication

• The PRF expands the preMaster into a new random value called the masterKey

▪ To create master card, the message digest of the pre-master

❖ Uses pseudorandom to generate master secret

• Use strong algorithm ▪ Use simple algorithm ❖ A complex protocol

Page 16: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 17: Presented by Muhammad Luqmal NulHakim Bin Rosli

Client

Server

Sending file • Handshaker protocol phase (3 phases)➢ Phase 1 : client and server

connect each other➢ Phase 2 : key exchange➢ Phase 3 : client and server

disconnect • Data transfer (segment into vssp

packet)✓ Compression (reduce the total

size)✓ Counter (avoid from retransmit

the same vssp packet)• Closure

❑ Avoid a situation where the truncation attack

Very simple secure protocol process

Receive file

Page 18: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 19: Presented by Muhammad Luqmal NulHakim Bin Rosli

TLS

Page 20: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 21: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 22: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 23: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 24: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 25: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 26: Presented by Muhammad Luqmal NulHakim Bin Rosli

• Manjuprasad, B., and Andhe Dharani. "Simple Secure Protocol for Wireless

Sensor Networks." 2014 World Congress on Computing and Communication

Technologies. IEEE, 2014.

• Efi Merdler (MAY 24, 2008). Creating a secure channel. Retrieved from

https://www.codeproject.com/Articles/26332/Creating-a-secure-channel

• Bhiogade, Mittal S. "Secure socket layer." Computer Science and Information

Technology Education Conference. 2002.

Page 27: Presented by Muhammad Luqmal NulHakim Bin Rosli

• Katz, Jonathan, Steven Myers, and Rafail Ostrovsky. "Cryptographic counters and

applications to electronic voting." International Conference on the Theory and

Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2001.

• TechDifferences (September 9, 2017). Difference between SSL and TLS. Retrieved

from https://techdifferences.com/difference-between-ssl-and-tls.html

• GlobalSign Blog (July 7, 2016). SSL vs. TLS - What's the Difference. Retrieved from

https://www.globalsign.com/en/blog/ssl-vs-tls-difference/

• Chou, Wesley. "Inside SSL: the secure sockets layer protocol." IT professional 4.4

(2002): 47-52.

Page 28: Presented by Muhammad Luqmal NulHakim Bin Rosli

• Rescorla, Eric. SSL and TLS: designing and building secure systems.

Vol. 1. Reading: Addison-Wesley, 2001.

• Oppliger, Rolf. SSL and TLS: Theory and Practice. Artech House,

2016.

• Krawczyk, Hugo, Kenneth G. Paterson, and Hoeteck Wee. "On the

security of the TLS protocol: A systematic analysis." Annual

Cryptology Conference. Springer, Berlin, Heidelberg, 2013.

Page 29: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 30: Presented by Muhammad Luqmal NulHakim Bin Rosli

Presented by

Muhammad Luqmal NulHakim Bin RosliProgram :

Bachelor Degree Of Computer Network SecurityMatric No :

BTBL17046729Supervisor :

Dr Mohd Fadzil Bin Abdul Kadir

Page 31: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 32: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 33: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 34: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 35: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 36: Presented by Muhammad Luqmal NulHakim Bin Rosli

Encipher Decipher

Local Area Network

Public key Private key

Cipher text

Plaintext Plaintext

Page 37: Presented by Muhammad Luqmal NulHakim Bin Rosli

Request connection

Accept connection

Data transfer phase

Request disconnection

Accept disconnection

Handshake phase

Closure

Page 38: Presented by Muhammad Luqmal NulHakim Bin Rosli

Client Server

Handshake

Data transfer

Closure

Page 39: Presented by Muhammad Luqmal NulHakim Bin Rosli

Phase 1

• Client message initiates the connection

• Its contains 2 parameter which are random value and list of supported suites

• Server replies with its own message

• Its contains 3 parameters which are random value, chosen suite and certificate

Phase 2

• Encrypt a shared secret (private key)

• Client encrypt a shared secret using the public key

• Sends it to the server• Final key used to

initialize the algorithm that were define in chosen suite.

Page 40: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 41: Presented by Muhammad Luqmal NulHakim Bin Rosli

Data transfer phase

• Data segmented into vssp packet

• Each packet has a header, payload, and a digest

• Header contains

• VSSP magic number

• VSSP version

• Message type

• Data size

• Compression used in order to reduce total size of the

packet

• Counters used to avoid retransmit the same VSSP packet

• If the message receive, the receive counter increased by

1

• When the message send, the send counter increased by 1

Page 42: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 43: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 44: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 45: Presented by Muhammad Luqmal NulHakim Bin Rosli

• Start/Run server

application

• Receive encrypted

message

• Decrypted encrypted

message using private key

• Get original message

• Exchange key with private

key and random number

• Encrypted message with

public key

• Send encrypted message

Client Server

Page 46: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 47: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 48: Presented by Muhammad Luqmal NulHakim Bin Rosli
Page 49: Presented by Muhammad Luqmal NulHakim Bin Rosli