CNS Unit 4
CNS Unit 4
3) Change-Cipher Protocol
This protocol uses the SSL record protocol. Unless Handshake Protocol is completed,
the SSL record Output will be in a pending state. After the handshake protocol, the
Pending state is converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in length and can
have only one value. This protocol’s purpose is to cause the pending state to be copied
into the current state.
4) Alert Protocol
This protocol is used to convey SSL-related alerts to the peer entity. Each message in
this protocol contains 2 bytes.
Two important TLS concepts are the TLS session and the TLS connection, which are
defined in the specification as follows:
Connection: A connection is a transport (in the OSI layering model definition) that
provides a suitable type of service. Every connection is associated with one session.
Session: A TLS session is an association between a client and a server. Sessions are
created by the Handshake Protocol.
Transport Layer Security Protocols
• TLS Record Protocol
• Handshake Protocol
• Change-Cipher Spec Protocol
• Alert Protocol
1)TLS Record Protocol :
• The TLS Record Protocol provides two services for TLS connections:
• Confidentiality: The Handshake Protocol defines a shared secret key that is used for
conventional encryption of TLS payloads.
• Message Integrity: The Handshake Protocol also defines a shared secret key that is
used to form a message authentication code (MAC).
In the TLS Record Protocol application data is divided into fragments. The fragment
is compressed and then encrypted MAC (Message Authentication Code) generated by
algorithms like SHA (Secure Hash Protocol) and MD5 (Message Digest) is appended.
After that encryption of the data is done and in last TLS header is appended to the
data.
The final step of TLS Record Protocol processing is to prepend a header consisting of
the following fields:
Content Type (8 bits): The higher-layer protocol used to process the enclosed
fragment.
Major Version (8 bits): Indicates major version of TLS in use. For TLSv2, the value
is 3.
Minor Version (8 bits): Indicates minor version in use. For TLSv2, the value is 1.
Compressed Length (16 bits): The length in bytes of the plaintext fragment
2) Handshake Protocol:
This protocol allows the server and client to authenticate each other and to negotiate
an encryption and MAC algorithm and cryptographic keys to be used to protect data
sent in a TLS record. The Handshake Protocol is used before any application data is
transmitted.
• Phase-1: In Phase-1 both Client and Server send hello-packets to each other. In this IP
session, cipher suite and protocol version are exchanged for security purposes.
• Phase-2: Server sends his certificate and Server-key-exchange. The server end phase-
2 by sending the Server-hello-end packet.
• Phase-3: In this phase, Client replies to the server by sending his certificate and
Client-exchange-key.
• Phase-4: In Phase-4 Change-cipher suite occurs and after this the Handshake Protocol
ends.
3) Change-Cipher Protocol
This protocol uses the SSL record protocol. Unless Handshake Protocol is completed,
the SSL record Output will be in a pending state. After the handshake protocol, the
Pending state is converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in length and can
have only one value. This protocol’s purpose is to cause the pending state to be copied
into the current state.
4) Alert Protocol
The Alert Protocol is used to convey TLS-related alerts to the peer entity.
alert messages are compressed and encrypted, as specified by the current state.
Each message in this protocol consists of two bytes . The first byte takes the value
warning (1) or fatal (2) to convey the severity( Condition) of the message.
The second byte contains a code that indicates the specific alert.
The following alerts are always fatal:
• unexpected_message: An inappropriate message was received.
• bad_record_mac: An incorrect MAC was received.
• decompression_failure: The decompression function received improper input
handshake_failure: Sender was unable to negotiate an acceptable set of security
parameters given the options available
HTTPS:
HTTPS (HTTP over SSL) refers to the combination of HTTP and SSL to implement
secure communication between a Web browser and a Web server.
When HTTPS is used, the following elements of the communication are encrypted:
■ URL of the requested document
■ Contents of the document
■ Contents of browser forms (filled in by browser user)
■ Cookies sent from browser to server and from server to browser
■ Contents of HTTP header
Connection Initiation:
For HTTPS, the agent acting as the HTTP client also acts as the TLS client.
The client initiates a connection to the server on the appropriate port and then sends
the TLS Client Hello to begin the TLS handshake finished,
The client may then initiate the first HTTP request.
All HTTP data is to be sent as TLS application data.
Normal HTTP behavior, including retained connections, should be followed.
There are three levels of awareness of a connection in HTTPS. At the HTTP level, an
HTTP client requests a connection to an HTTP server by sending a connection request
to the next lowest layer.
Connection Closure:
An HTTP client or server can indicate the closing of a connection by including
the following line in an HTTP record: Connection: close. This indicates that the
connection will be closed after this record is delivered.
SECURE SHELL(SSH):
• Secure Shell (SSH) is a protocol for secure network communications designed to be
relatively simple and inexpensive to implement.
• SSH provides a secure remote logon facility to replace TELNET and other remote
logon schemes that provide no security.
• SSH uses network facilities like file transfer and email.
1. With a wireless LAN, any station within radio range of the other devices on the LAN can
transmit.
2. With a wireless LAN, any station within radio range can receive.
Wi-Fi Protected Access (WPA) as a Wi-Fi standard implemented by using IEEE 802.11i
The final form of the 802.11i standard is referred to as Robust Security Network (RSN).
IEEE 802.11i Services
Authentication: A protocol is used to define an exchange between a user and an AS that
provides mutual authentication and generates temporary keys to be used between the client and
the AP over the wireless link.
Access control: This function enforces the use of the authentication function, routes the
messages properly, and facilitates key exchange. It can work with a variety of authentication
protocols.
Privacy with message integrity: MAC-level data (e.g., an LLC PDU) are encrypted along
with a message integrity code that ensures that the data have not been altered.
Elements of IEEE 802.11i