4 - Internet Security - Part1
4 - Internet Security - Part1
1
Outline
2
Secure Communication in Practice
3
Secure Communication in Practice
4
Secure Communication in Practice
5
Digital Certificate and
Certificate Authority
• Digital Certificate: issued by Certificate Authority
(CA)
• Certificate binds public key to a particular entity.
Has 4 components:
1. ID of entity
2. Public key associated with entity
3. Time frame this certificate is valid
4. Signature of the Certificate Authority (CA)
6
Public-key Certification
Signsk_CA(certificate)
Bob’s
public pkB digital
key signature
CA
Bob’s private certificate for Bob’s
identifying key public key, signed
information by CA
sk
CA
Verify digital
signature
pkB
Bob’s
CA
Public key
public
verified
pkCA key
7
Public-key Certification
8
Certificate Transparency
9
Certificate Transparency
• CL server builds a
Merkle tree over the
certificates
• Signs and sends the root
• To verify if a certificate is
in CL:
• Query certificate from CL
• CL sends Merkle Proof
• Verify Merkle Proof
10
Certificate Transparency
11
KDC vs PKI
12
Security in IP Networks –
Protocol Stack
These aren’t
present in Internet.
E.g., URL
IP Address
E.g., 8.8.8.8
MAC Address
E.g., 28:cf:e9:04:59:a5
13
Security in IP Networks
My address is 1.1.1.1
14
Transport Layer Security (TLS)
15
Transport Layer Security (TLS)
(7) ChangeCipherSpec
19
TLS Master Key
• Master key is “root key” used to derive all session keys
• Master key is partitioned and transformed to generate
keys for message authentication and encryption
Client MAC key
PRF Server MAC key
Master Key
Client Encryption key
Server Encryption Key
• TLS 1.3 no longer uses a single “master secret” in the
same sense. Instead, it uses a sophisticated key
schedule
20
TLS Record
Data m
Fragment m1 m2 m3
21