SSL & SET: An Overview

Download Report

Transcript SSL & SET: An Overview

SSL : An Overview
Bruhadeshwar Bezawada
International Institute of Information
Technology, Hyderabad
Overview

Brief Introduction to Public-Key
Infrastructure



Public-keys, Certificates & Digital Signatures
Relevance to Electronic Commerce
SSL


Protocol details
Cryptographic details
Internet Threats






Weak security in TCP/IP
Eavesdropping
Theft of valuable information
Fraud
Authentication
Non-repudiation
Difficult to transform normal business practices
into Internet usable form with such issues
Small Intro to PKI

Problem Solved by PKI?



Asymmetric key cryptography: one (public) key encrypts,
the other (private) decrypts



Secure communication over an insecure channel
Confidentiality, authentication, non-repudation and Integrity
The whole technique is public-key cryptography
Solutions: RSA, El-Gamal, ECC
Issues with PKI


Verifying the ownership and security of public-keys
High cost of computation when sending bulk data (RSA
exponentiation)
Addressing Issues in PKI

Digital signatures: encryption with private key, unforgeable in real-time; verifiable with public-keys


Certificates: Public-keys that are digitally signed by a
trusted-third party, e.g., a certifying authority (CA)


Catch22: Need the Public-key of the CA to verify!
Certificate hierarchy: A method used to verify certificates
issued by CAs whose public-keys are not known


Other critical uses as well : non-repudiation
CAs sign exchange and sign each other’s public-keys securely
To reduce computational overhead PKI is generally used
in as a vehicle to convey session keys

Reducing the overhead further without too many modifications
to current PKI-based protocols is an open area
X.509 v3 Certificate Attributes
version (v3)
serial number
signature algorithm id
issuer name
validity period
subject name
subject public key info
issuer unique identifier
subject unique identifier
extensions
CA’s
signature
Sharath Jeppu
criticality
flag
extn.a cf value
extn b cf value
extn.c cf value
Can include any data, including
graphics (GIF), video, audio, etc.
Relevance to E-Commerce

Business model in electronic world




Problems




Customer shops for product using e-carts
Makes a payment in credit card
Gets confirmation of payment and delivery
How to secure the credit-card information when sent over a
public network like Internet?
How to trust that the merchant has not charged more than what
you ordered?
How to make the merchant is liable if the delivery is not made?
PKI solves these problems


Need appropriate protocols that work in real-time
And hence, SSL & SET
SSL: Secure Sockets Layer


Runs above TCP/IP below application layer
Purpose


Provide secure & authenticated communication between client &
server
Services





Authenticates server to client
Negotiation of cryptographic parameters
Session key establishment & encrypted communication
Connection reliability is maintained via message integrity checks
(message authentication codes MAC)
Optional: authenticate client to server (often, not possible;
password authentication is current default)
Protocol Details

SSL Record Layer


This lies below SSL handshake and encapsulates the
handshake data
Alert protocol


SSL Handshake




Closure, error, unsupported certificate etc
Sets up the connection between client and server
Negotiates cryptographic parameters
Provides confidentiality, authentication, reliability and
integrity of data
Change cipher

Signals change in ciphering strategies
SSL States

Session State characterized by






session identifier
peer certificate
compression method
cipher spec (DES, MD5 etc)
master secret (shared secret between server
and client)
flag (is resumable)
SSL States

Connection State







server and client random byte sequences
MAC secret used by server
MAC secret used by client
encryption key used by server
encryption key used by client
initialization vector for CBC mode
sequence numbers
SSL Handshake
References

William Stallings: Cryptography and

Sun Website:

Netscape SSL Specification V3:
Network Security
http://docs.sun.com/source/816-615610/contents.htm
http://wp.netscape.com/eng/ssl3/3SPEC.HTM