03 Unit-3
03 Unit-3
P S MANN, Ph.D.
M-ACM, M-IAENG, M-CSI, LM-ISTE, LM-PAS
Gujarat Technological University (GTU)
(NAAC Accredited A+ Grade University)
Ahmedabad, Gujarat, India. 382424
UNIT III
2
Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS),
Secure Electronic Transaction (SET), Intruders, Viruses and related threats. Firewall
Although Web browsers are very easy to use, Web servers are relatively easy to
configure and manage, and Web content is increasingly easy to develop, the
underlying software is extraordinarily complex. This complex software may hide
many potential security flaws.
A Web server can be exploited as a launching pad into the corporation’s or agency’s
entire computer complex. Once the Web server is subverted, an attacker may be able
to gain access to data and systems not part of the Web itself but connected to the
server at the local site.
Casual and untrained users are common clients for Web based services. Such users
are not necessarily aware of the security risks that exist and do not have the tools or
knowledge to take effective countermeasures.
Web Security Threats
4
Web Traffic Security Approaches
5
Secure Sockets Layer (SSL)
6
SSL could be provided as part of the underlying protocol suite and therefore be
packages. For example, most browsers come equipped with SSL, and most Web
SSL is designed to make use of TCP to provide a reliable end-to-end secure service.
SSL is not a single protocol but rather two layers of protocols.
The SSL Record Protocol provides basic security services to various higher layer
protocols. In particular, the Hypertext Transfer Protocol (HTTP), which provides the
transfer service for Web client/server interaction, can operate on top of SSL. Three
higher-layer protocols are defined as part of SSL: the Handshake Protocol, The Change
Cipher Spec Protocol, and the Alert Protocol. These SSL-specific protocols are used in
Two important SSL concepts are the SSL session and the SSL connection, which are
defined in the specification as follows.
The SSL Record Protocol provides two services for SSL connections:
Confidentiality: The Handshake Protocol defines a shared secret key that is used
Message Integrity: The Handshake Protocol also defines a shared secret key that is
The Change Cipher Spec Protocol is one of the three SSL-specific protocols that use
the SSL Record Protocol, and it is the simplest. This protocol consists of a single
message , which consists of a single byte with the value 1. The sole purpose of this
message is to cause the pending state to be copied into the current state, which
The Alert Protocol is used to convey SSL-related alerts to the peer entity. As with
other applications that use SSL, alert messages are compressed and encrypted, as
specified by the current state.
Each message in this protocol consists of two bytes. The first byte takes the value
warning (1) or fatal (2) to convey the severity of the message. If the level is fatal,
SSL immediately terminates the connection. Other connections on the same session
may continue, but no new connections on this session may be established. The
The most complex part of SSL is the Handshake Protocol. This protocol allows the
server and client to authenticate each other and to negotiate an encryption and MAC
algorithm and cryptographic keys to be used to protect data sent in an SSL record. The
Handshake Protocol is used before any application data is transmitted. The Handshake
Version Number
The TLS Record Format is the same as that of the SSL Record Format, and the
fields in the header have the same meanings. The one difference is in version values.
For the current version of TLS, the major version is 3 and the minor version is 3.
Transport Layer Security (TLS)
18
There are two differences between the SSLv3 and TLS MAC schemes: the actual
algorithm and the scope of the MAC calculation. TLS makes use of the HMAC
algorithm.
SSLv3 uses the same algorithm, except that the padding bytes are concatenated with
the secret key rather than being XORed with the secret key padded to the block
length. The level of security should be about the same in both cases.
Transport Layer Security (TLS)
19
Alert Codes
TLS supports all of the alert codes defined in SSLv3 with the exception of
no_certificate.
Cipher Suites
There are several small differences between the cipher suites available under SSLv3
and under TLS:
Key Exchange: TLS supports all of the key exchange techniques of SSLv3 with the
exception of Fortezza.
Padding
In SSL, the padding added prior to encryption of user data is the minimum amount
required so that the total size of the data to be encrypted is a multiple of the cipher’s
block length. In TLS, the padding can be any amount that results in a total that is a
padding length may be used to frustrate attacks based on an analysis of the lengths of
exchanged messages.
HTTPS
21
HTTPS (HTTP over SSL) refers to the combination of HTTP and SSL to implement
secure communication between a Web browser and a Web server.
The HTTPS capability is built into all modern Web browsers. Its use depends on the
Web server supporting HTTPS communication. For example, some search engines do
not support HTTPS. Google provides HTTPS as an option:
https://google.com.
The principal difference seen by a user of a Web browser is that addresses begin with
https:// rather than http://. A normal HTTP connection uses port 80. If HTTPS is
specified, port 443 is used, which invokes SSL.
HTTPS
22
When HTTPS is used, the following elements of the communication are encrypted:
Note : There is no fundamental change in using HTTP over either SSL or TLS, and both
implementations are referred to as HTTPS.
Secure Electronic Transaction (SET)
23
Secure Electronic Transaction or SET is a system that ensures the security and
integrity of electronic transactions done using credit cards in a scenario. SET is not
some system that enables payment but it is a security protocol applied to those
payments. It uses different encryption and hashing techniques to secure payments over
the internet done through credit cards. The SET protocol was supported in development
by major organizations like Visa, Mastercard, Microsoft which provided its Secure
Transaction Technology (STT), and Netscape which provided the technology of Secure
24
SET protocol restricts the revealing of credit card details to merchants thus keeping
hackers and thieves at bay. The SET protocol includes Certification Authorities for
The SET protocol has some requirements to meet, some of the important requirements
are :
SET also needs to provide interoperability and make use of the best security
mechanisms.
Participants in SET
26
Cardholder – customer
Merchant
Provide Authentication
Provide Message Integrity: SET doesn’t allow message modification with the help of
signatures. Messages are protected against unauthorized modification using RSA digital
signatures with SHA-1 and some using HMAC with SHA-1,
Dual Signature
28
The dual signature is a concept introduced with SET, which aims at connecting two
Where,
Here,
The Merchant verifies by comparing POMD generated through PIMD hashing with
POMD generated through decryption of Dual Signature as follows:
Since we used Customer’s private key in encryption here we use KUC which is the public
key of the customer or cardholder for decryption ‘D’.
Payment Authorization and Payment Capture
33
by the merchant which ensures payment will be received by the merchant. Payment
capture is the process by which a merchant receives payment which includes again
generating some request blocks to gateway and payment gateway in turn issues
address some of the problems and limitations of the use of Simple Mail Transfer
Protocol (SMTP).
to the MIME Internet e-mail format standard based on technology from RSA Data
Security.
Limitations of the SMTP
35
SMTP cannot transmit text data that includes national language characters because
these are represented by 8-bit codes with values of 128 decimal or higher, and
SMTP gateways that translate between ASCII and the character code EBCDIC do
MIME-Version: Must have the parameter value 1.0. This field indicates that the
message conforms to RFCs 2045 and 2046.
Content-Type: Describes the data contained in the body with sufficient detail that the
receiving user agent can pick an appropriate agent or mechanism to represent the data to
the user or otherwise deal with the data in an appropriate manner.
Content-Description: A text description of the object with the body; this is useful when
the object is not readable (e.g., audio data).
MIME Content Types
37
Canonical Form
38
An important concept in MIME and S/MIME is that of canonical form. Canonical form is a
format, appropriate to the content type, that is standardized for use between systems. This is
in contrast to native form, which is a format that may be peculiar to a particular system.
S/MIME
I Functionality
39
Enveloped data: This consists of encrypted content of any type and encrypted
Signed data: A digital signature is formed by taking the message digest of the
content to be signed and then encrypting that with the private key of the signer. The
content plus signature are then encoded using base64 encoding. A signed data
Clear-signed data: As with signed data, a digital signature of the content is formed.
However, in this case, only the digital signature is encoded using base64. As a
result, recipients without S/MIME capability can view the message content,
nested, so that encrypted data may be signed and signed data or clear-signed data
may be encrypted.
Self Learning Topic
41
Intruders
Viruses
Firewalls
Many Thanks !