Web Security: Course: Network Security by DR Adnan Nadeem
Web Security: Course: Network Security by DR Adnan Nadeem
Web Security
This lecture slides are from Network Security Essential , William Stallings
Web Security
Some fundamental questions .. - What is web??? - Protocol ? - Web Security threats ?
- threats at web browser - threats related to network traffic b/w browser & web server
SSL Architecture
SSL Architecture
SSL session
an association between client & server created by the Handshake Protocol define a set of cryptographic parameters may be shared by multiple SSL connections
SSL connection
a transient, peer-to-peer, communications link associated with 1 SSL session
SSL Architecture
Session state
Session id, peer certificate Compression method Cipher spec , encryption & hash algorithm etc.
Connection state
Server /client write keys Byte sequence, sequence no. Initialization vector etc
message integrity
using a MAC with shared secret key similar to HMAC but with different padding
specific alert
unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown
SET Components
SET Transaction
1. customer opens account 2. customer receives a certificate 3. merchants have their own certificates (2 keys
signing message & key exchange)
6. order and payment are sent 7. merchant requests payment authorization 8. merchant confirms order 9. merchant provides goods or service 10. merchant requests payment to payment gateway
SET services
SET provide three major services Secure communication channel among all parties during transaction Provide trust by use of X.509v3 certificate Ensures privacy of participants
Dual Signature
customer creates dual messages
order information (OI) for merchant payment information (PI) for bank
neither party needs details of other but must know they are linked use a dual signature for this
signed concatenated hashes of OI & PI
Payment Authorization
Merchant sends an authorization request to payment gateway with Purchase related information (customer)
PI, OI, dual signature, digital envelope
Certificates
card holder & merchant signature key, merchant key exchange certificate
Payment Capture
merchant sends payment gateway a payment capture request gateway checks request then causes funds to be transferred to merchants account notifies merchant using capture response
Summary
have considered:
need for web security SSL/TLS transport layer security protocols SET secure credit card payment method