Professional Documents
Culture Documents
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
1
Lt Col Md Jahangir Hossain
25 Feb 2022
Outline
What is SSL
History of SSL
Benefits of SSL
Limitations of SSL
SSL components/architecture
SSL record protocol operation
SSL in real world
Digital signature
Digital Envelope
How SSL works
Attacks against SSL/TLS
2
What is SSL (Secure Socket Layer)?
3
SSL (Secure Socket Layer)
TCP: provides a reliable end-to-end service.
TCP & SSL: provides a reliable & secure end-to-end
service.
HTTPS: HTTP over SSL (or TLS-Transport Layer Security)
Typically on port 443 (regular http on port 80)
Subsequently became Internet standard known as TLS
4
SSL/TLS
SSL /TLS shows visitors that they can safely transmit sensitive
information to and from the server. It encrypts all the data transfers in
such a way that they can’t be unscrambled by third-parties such as
hackers and scammers
SSL/TLS
You can identify whether a website is using SSL or not by looking
for a padlock icon or a green bar at the top of your browser. You
should be able to click on this icon to view the information on who
holds the certificate and to manage your SSL settings.
History of the Protocol
Benefits of
TLS/SSL
TLS/SSL provides numerous benefits to clients and servers over
other methods of authentication, including:
Confidentiality
Encrypt data being sent between client and server, so that
passive wiretappers cannot read sensitive data.
Integrity Protection
Protect against modification of messages by an active
wiretapper.
Authentication
Verify that a peer is who they claim to be. Servers are
usually authenticated, and clients may be authenticated if
requested by servers
9
How SSL Achieves Confidentiality
Create a secret key
Based on information generated by the client with a
secure random number generator
Use public keys to exchange the secret key
The server sends its public key to the client
The client encrypts the secret key with the server's public
key and sends it to the server
The server decrypts the secret key information with the
server’s private key
Encrypt and decrypt data with the secret key
The client and server use the negotiated algorithm
10
How SSL Achieves Authentication
Optional
Protocol
If the client wants to authenticate the server, then they
follow the protocol in “Authentication with a Public Key
Certificate” with the client.
If the server wants to authenticate the client, then they
follow the protocol in “Authentication with a Public Key
Certificate” with the server.
11
Limitations of TLS/SSL
12
SSL components
SSL Handshake Protocol
Negotiation of security algorithms and parameters
key exchange
server authentication and optionally client authentication
SSL Record Protocol
fragmentation
compression
message authentication and integrity protection
encryption
SSL Alert Protocol
error messages (fatal alerts and warnings)
SSL Change Cipher Spec Protocol
a single message that indicates the end of the SSL handshake
13
SSL Architecture
SSL Record Protocol Services
SSL Record Protocol provides two services.
Message integrity
using a MAC with a shared secret key
similar to HMAC but with different padding
hash functions: MD5, SHA-1
Message confidentiality
using symmetric encryption with a shared secret key
encryption algorithms: AES, IDEA, RC2-40, DES-40,
DES, 3DES, RC4-40, RC4-128
SSL Record Protocol Operation
≤ 214 bytes
17
SSL / TLS in the Real World
SSL / TLS in the Real World
SSL Implementation
The secure web site includes a digital certificate signed by
some certificate authority (CA). The certificate includes
the server name, its public key, IP number, and an
expiration date. It is typically signed with a 1024 bit key by
the CA
Certificate Authorities
In cryptography, a certificate authority or certification
authority (CA) is an entity that issues digital certificates.
21
Certificate
Authorities
(CA)
22
Digital Signature
23 Cont…..
Digital Signature
24
Cont…..
Objectives of Digital Signature
Authentication
Digital signatures can be used to authenticate the source of
messages.
Integrity
The sender and receiver of a message may have a need for
confidence that the message has not been altered during
transmission.
Non-repudiation
Non-repudiation or more specifically non-repudiation of origin, is
an important aspect of digital signatures. By this property, an
entity that has signed some information cannot later deny having
signed it.
25
Cont…..
Objectives of Digital Signature
Also:
-Transparency
-Accountability
-Elimination of Intermediator
-Encouraging Citizens to exercise their Rights
-Secured electronic communications within judiciary
26
Digital Envelope
28
How SSL Works
During the initial connection, the public and private keys will be
used to create a session key, which will then be used to encrypt
and decrypt the data that’s being transferred. This session key will
remain valid for a limited time and only be used for that particular
session.
How SSL Works: the Handshake in Detail
How SSL Works: the Handshake in Detail
31 Cont…..
How SSL Works: the Handshake in Detail
3. The client proceeds with the authentication of the server
by examining the provided certificate, checking that the CA
appears in the list of trusted CAs.
32 Cont…..
How SSL Works: the Handshake in Detail
6. ClientKeyExchange - The client creates a premaster
secret (session key) that can be used only for the present
exchange of information and data, it is encrypted with
the server's public key (contained in the server's
certificate), and it sends the encrypted session key to the
server.
35
Feature SSL TLS
Developed Netscape in 1995 Successor of SLL DEVELOPED by
by IETF in 1999
Version SSL1.0, SSL2.0, TLS1.0,TLS1.1,TLS1.2, TLS1.3
SSL3.0
Compatibilit Doesn't support TLS TLSv1.0 had a fallback mechanism
y
Browser Not supported by Most browser supports this protocol
Support present day browser
Speed It is faster Slower due to the 2-step communication
process of handshaking and data transfer
Starts with a secured Can start with unsecured communication
channel and continues and dynamically switch to a secured
directly to security channel based on the negotiation with the
negations on a other side
dedicated port
Widely supported in Supported and implemented on servers,
client-side application compared to end user devices
Cryptograph Message digest is used Pseu-random function is used to create
ic security to create master key master key
Attacks against TLS/SSL
Renegotiation attack
Version rollback attacks
BEAST attack
CRIME
BREACH attacks
Padding attacks
Heartbleed Bug
37
Renegotiation Attack
Discovered in August 2009
Plaintext injection attacks against SSL 3.0 and all current
versions of TLS.
For example, it allows an attacker who can hijack an https
connection to add their own requests into the
conversation the client has with the web server.
38
Version Rollback Attack
An attacker may be able to influence the cipher suite
selection in an attempt to downgrade the cipher suite
strength, to use either a weaker symmetric encryption
algorithm or a weaker key exchange.
Tricks the client and server into using older protocols or
insecure parameters for encrypting the information in
transit.
39
Version Rollback Attack
Versionc=2.0, suitec, Nc
C {Secretc}Ks
S
41
CRIME Attack
42
BREACH Attack
Browser Reconnaissance & Ex-filtration via Adaptive
Compression of Hypertext
It allow an attacker to recover the content of web
cookies when data compression is used along with TLS.
When used to recover the content of secret authentication
cookies, it allows an attacker to perform session hijacking
on an authenticated web session.
43
Padding Attack
44
Heartbleed bug Attack
The Heartbleed Bug is a serious vulnerability in the popular
OpenSSL cryptographic software library. This weakness allows
stealing the information protected, under normal conditions, by
the SSL/TLS encryption used to secure the data payloads.
In short, a malicious user could easily trick a vulnerable web
server into sending sensitive information, including usernames
and passwords.
45
Questions?
46
Thank You
47