Made By: Manish Kumar Aery (IM66) Department of Computer Application IET Bhaddal (Ropar)
Made By: Manish Kumar Aery (IM66) Department of Computer Application IET Bhaddal (Ropar)
Confidentiality
Integrity
Availability
Eavesdropping on transmissions
To obtain information
Release of message contents
Traffic analysis
By monitoring frequency and length of messages, even
encrypted, nature of communication may be guessed
Difficult to detect
Can be prevented
Masquerade
Pretending to be a different entity
Replay
Modification of messages
Denial of service
Easy to detect
Hard to prevent
Plain text
Encryption algorithm
Secret key
Cipher text
Decryption algorithm
Crypt analysis
Relay on nature of algorithm plus some knowledge of general
characteristics of plain text
Attempt to deduce plain text or key
Brute force
Try every possible key until plain text is achieved
Block cipher
Process plain text in fixed block sizes producing block of
cipher text of equal size
Data encryption standard (DES)
Triple DES (TDES)
Advanced Encryption Standard
US standard
64 bit plain text blocks
56 bit key
Broken in 1998 by Electronic Frontier Foundation
Simple structure
For both encryption and decryption, cipher begins with Add Round Key
stage
Followed by nine rounds,
Each includes all four stages
Session Key
Used for duration of one logical connection
Destroyed at end of session
Used for user data
Permanent key
Used for distribution of keys
Encryption is slow
Encryption hardware expensive
Encryption hardware optimized to large data
Algorithms covered by patents
Algorithms subject to export controls (from USA)
Ingredients
Plain text
Encryption algorithm
Public and private key
Cipher text
Decryption algorithm
Security services
Transport Layer Security defined in RFC 2246
SSL general-purpose service
Handshake Protocol
Change Cipher Spec Protocol
Alert Protocol
Used in management of SSL exchanges (see later)
Connection
Session
Confidentiality
Message Integrity
Authenticate
Negotiate encryption and MAC algorithm and
cryptographic keys
Used before any application data sent
Version
Random
Session ID
Variable-length
Nonzero indicates client wishes to update existing connection or create new
connection on session
Zero indicates client wishes to establish new connection on new session
CipherSuite
Compression Method
Phase 3
Upon receipt of server_done, client verifies certificate if required and
check server_hello parameters
Client sends messages to server, depending on underlying public-key
scheme
Completes setting up
Client sends change_cipher_spec
Copies pending CipherSpec into current CipherSpec
Not considered part of Handshake Protocol
Sent using Change Cipher Spec Protocol
Client sends finished message under new algorithms, keys, and secrets
Finished message verifies key exchange and authentication successful
Server sends own change_cipher_spec message
Transfers pending to current CipherSpec
Sends its finished message
Handshake complete
IPSec
Secure branch office connectivity over Internet
Secure remote access over Internet
Extranet and intranet connectivity
Enhanced electronic commerce security
Authentication header
Encapsulated security payload
Key exchange
RFC 2401,2402,2406,2408
Path MTU
ESP
Confidentiality services