Top Banner
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
30

Secure Sockets Layer (SSL)

Feb 03, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure Sockets Layer (SSL)

Introduction

♦Haroula Zouridaki♦Mohammed Bin Abdullah♦Waheed Qureshi

Page 2: Secure Sockets Layer (SSL)

Introduction

Comparing Secure Hypertextprotocol (S-HTTP) to Secure Socket Layer (SSL)

Page 3: Secure Sockets Layer (SSL)

Agenda

♦Waheed– opens the presentation– introduces S-HTTP

♦Haroula– introduces SSL

♦Mohammed– Compares S-HTTP to SSL– Concludes the presentation

Page 4: Secure Sockets Layer (SSL)

Internet Security♦Two basic security services

– Access Security– Transaction Security

♦Several mechanism to provide transaction security– S-HTTP– SSL– PCT– SET

Page 5: Secure Sockets Layer (SSL)

S-HTTP

♦Developed by the Enterprise Integration Technologies (EIT) Inc in 1994

♦EIT formed Terisa Systems in conjunction with RSA Data Security

♦Terisa Systems is currently owned by spyrus Inc.

♦Verifone?

Page 6: Secure Sockets Layer (SSL)

Functionality

♦Message oriented protocol♦Works at the application layer

WWW ClientCrypto Smarts

Encryptedand/or signedmessage

Network Layer

WWW ServerCrypto Smarts

Encryptedand/or signedmessage

Network Layer

Client Machine Server Machine

Secure HTTP

Unencrypted Channel

Page 7: Secure Sockets Layer (SSL)

How does it work

♦Message Preparation:– Clear text message not necessarily HTTP– Receiver’s cryptographic preferences and

keying material– Sender’s cryptographic preferences and keying

material

Page 8: Secure Sockets Layer (SSL)

How does it work (Cont’)

♦Message Recovery– Receiver gets the S-HTTP message– Receiver’s stated cryptographic

preferences and keying material– Receiver’s current cryptographic

preferences and keying material– Sender’s previously stated cryptographic

options

Page 9: Secure Sockets Layer (SSL)

Security Services

♦Provides following security services– Confidentiality– Non-repudiation– Integrity– Authentication

Page 10: Secure Sockets Layer (SSL)

Currently Supported Certificates and Algorithms♦One-way hash functions

– MD2 ,MD5 ,SHA-1♦Encryption Algorithms

– DES-CBC,3DES-CBC (2 or keys), DESX-CBC, IDEA-CFB, RC2-CBC,RC4,CDMF-CBC

♦ Digital Signature Algorithms – RSA, DSS ,SHS

Page 11: Secure Sockets Layer (SSL)

Flexibility♦ Provides symmetric capabilities to both server and

client♦ S-HTTP aware clients can communicate with S-

HTTP oblivious server and vice-versa♦ Allows client and server to negotiate the strength

and type of cryptographic option♦ supports PKI, Kerberos, and pre-arranged keys♦ Works with non PKI aware clients

Page 12: Secure Sockets Layer (SSL)

Current Implementations

♦NCSA httpd was the initial reference implementation, however it is no longer supported

♦Open Market’s Secure WebServer 2.0 and earlier versions. New version 2.1 no longer supports S-HTTP

♦SPRY Inc.'s SafteyWEB was a freely distributed version of S-HTTP server.

Page 13: Secure Sockets Layer (SSL)

Why is S-HTTP disappearing?♦Application dependent♦ Implementation is time consuming♦Netscape is used among 70% of the internet

community♦SSL/TLS is becoming a standard

Page 14: Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL):♦ Netscape Protocol♦ Layered on top of Transmittion Control Protocol

[TCP]♦ Layered below protocols that run on top of

TCP/IP[HTTP, LDAP, IMAC]♦ Later refitted as Internet Engineering Task Force

[IETF] standard Transport Layer Security [TLS]♦ Session oriented

Page 15: Secure Sockets Layer (SSL)

Security Services:

♦Confidentiality-All data encrypted

♦ Integrity-MAC, sequence number, per session key

♦Authentication-Public Key Cryptography

Page 16: Secure Sockets Layer (SSL)

Protocol Architecture:

♦SSL Record Protocol

♦SSL Handshake Protocol

Page 17: Secure Sockets Layer (SSL)

SSL Handshake Protocol:

SSL session begins with the handshake

♦Authentication♦Key exchange♦ Initialization, synchronization of security

parameters

Page 18: Secure Sockets Layer (SSL)

SSL Record Protocol:

♦ Data sent via this protocol

- Data compression- Data encryption- MAC to check the integrity

Page 19: Secure Sockets Layer (SSL)

Cryptographic Technique

♦ Message digest algorithmes-MD5. Message Digest algorithm developed by Rivest.-SHA-1. Secure Hash Algorithm, a hash function used by the U.S. Government.

♦ Encryption algorithms-DES. Data Encryption Standard, an encryption algorithm used by the U.S. Government.-RC2 and RC4. Rivest encryption ciphers developed for RSA Data Security.-Triple-DES. DES applied three times.-IDEA .International Data Encryption Algorithm.

♦ Digital signature algorithms-DSA. Digital Signature Algorithm, part of the digital authentication standard used by the U.S. Government.-RSA. A public-key algorithm for both encryption and authentication. Developed by Rifest, Shamir, and Adleman.

♦ Key exchange algorithm-KEA. Key Exchange Algorithm, an algorithm used for key exchange by the U.S. Government.-RSA key exchange. A key-exchange algorithm for SSL based on the RSA algorithm.-SKIPJACK. A classified symmetric-key algorithm implemented in FORTEZZA-compliant hardware used by the U.S. Government.

SSL comes in two strengths:

♦ 40-bit ♦ 128-bit session key.

Page 20: Secure Sockets Layer (SSL)

Hardware Accelerators:

♦ Why we need cryptographic accelerators:-typical server: 12 new SSL connections/sec.-accelerator fitted: 240 new SSL connections/sec.

♦ Queuing problem.

♦ Examples:1. Compaq AXL200 PCI Accelerator Card2. NCipher's nFast

3. Intel Netstructure 7110 e-Commerce Accelerator

Page 21: Secure Sockets Layer (SSL)

Implementation:♦ Public Domain:Servers

-Open SSL-Apache-SSL-SSLeay-Mod_SSL-SSLref

♦ Commercial Domain:SSL Server Certificates:

-40-bit: $125 -128-bit: $300 -Renew: $100

Page 22: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Functionality Performance

Performance factor S-HTTP SSL

Establishment latency Minimal High to medium

Overhead Significant depending on service provided Not significant

Processing Complexity Significant depending on service provided Not significant

Server resources Stateless/Stateful Stateful

Page 23: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Functionality Compatibility with other protocol

WWW ClientCrypto Smarts

Encryptedand/or signedmessage

Network Layer

WWW ServerCrypto Smarts

Encryptedand/or signedmessage

Network Layer

Client Machine Server Machine

HTTP

Unencrypted Channel

S-HTTP Application-levelSecurity

Client Machine Server Machine

WWW Server

Normal HTTPmessage

Network LayerCrypto Smarts

WWW Client

Normal HTTPmessage

Network LayerCrypto Smarts

HTTP

Encrypted Channel

SSLConnection-levelSecurity

Page 24: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Functionality Compatibility with other protocol

Protocol/Applications S-HTTP SSL

Proxy software Limited Support Practically NO support

Main Web applications/ protocols HTTP only HTTP, FTP, Telnet,

NNTP

Other Protocols CRL Servers, Kerberos LDAP, Kerberos*

Page 25: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Functionality Negotiation Flexibility

Security Services S-HTTP SSL

Combination Any Combination is Allowed

Certain Services are Mandatory

Order Any Order is Allowed Order of Service is Enforced

Page 26: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Functionality Key Exchange Mechanisms

Key Exchange Mechanism S-HTTP SSL

Kerberos Yes Yes*

RSA Yes Yes

FORTEZZA No Yes

Diffie-Hellman Yes Yes

KEA No Yes

Inband** Yes No

Out of band (prearranged) Yes No

* Apache SSL** Inband: Refers to the direct assignment of an uncovered key to a symbolic name.

This name could be used for later reference.

Page 27: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Security Security Services

Security Service S-HTTP SSL

Confidentiality Yes Yes

Message Integrity Yes Yes

Authentication Yes Yes

Non-repudiation Yes No

Page 28: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Security Vulnerability

S-HTTP • Traffic analysis attacks.• Key-exchange algorithm rollback attack• Use of in-band key exchange • Use of in-band key exchange is potentially problematic • Local clocks-based time stamps• Denial of service attack

SSL• Traffic analysis attacks.• Key-exchange algorithm rollback attack • Weakness of some implementation of (PKCS#1) • Denial of service attack

Page 29: Secure Sockets Layer (SSL)

S-HTTP vs. SSL: Security Future Trend

All indications show that S-HTTP seems to be loosing the battle to SSL

Page 30: Secure Sockets Layer (SSL)

Conclusion

♦No single web security solution♦Evaluate the security technologies based on

the application needs♦ use a combination of secure technologies♦Focus on more than a flawless protocol and

non-technical factors. ♦Security policy enforcement