Computer Security: Principles and Practice: Fourth Edition By: William Stallings and Lawrie Brown
Computer Security: Principles and Practice: Fourth Edition By: William Stallings and Lawrie Brown
Cleartext
Encrypte Nesting
Encoded message
d content of signed
message +
and and
+ signed encoded
associate encrypte
digest signed
d keys d entities
digest
Signed and Clear-Signed Data
• The preferred algorithms used for signing S/MIME
messages use either an RSA or a DSA signature of a SHA-
256 message hash
• The process works as follows:
• Take the message you want to send and map it into a fixed-length code of 256
bits using SHA-256
• The 256-bit message digest is unique for this message making it virtually
impossible for someone to alter this message or substitute another message
and still come up with the same digest
• S/MIME encrypts the digest using RSA and the sender’s private RSA key
• The result is the digital signature, which is attached to the message
• Now, anyone who gets the message can recompute the message digest then
decrypt the signature using RSA and the sender’s public RSA key
• Since this operation only involves encrypting and decrypting a 256-bit block,
it takes up little time
Enveloped Data
• Default algorithms used for encrypting S/MIME
messages are AES and RSA
• S/MIME generates a pseudorandom secret key that is used to
encrypt the message using AES or some other conventional
encryption scheme
• A new pseudorandom key is generated for each new message
encryption
• This session key is bound to the message and transmitted with it
• The secret key is used as input to the public-key encryption
algorithm, RSA, which encrypts the key with the recipient’s public
RSA key
• On the receiving end, S/MIME uses the receiver's private RSA key
to recover the secret key, then uses the secret key and AES to
recover the plaintext message
• If encryption is used alone, radix-64 is used to convert the
ciphertext to ASCII format
DomainKeys Identified
Mail (DKIM)
• Specification of cryptographically signing e-mail
messages permitting a signing domain to claim
responsibility for a message in the mail stream
• Proposed Internet Standard (RFC 4871:
DomainKeys Identified Mail (DKIM) Signatures)
• Has been widely adopted by a
range of e-mail providers
Secure Sockets Layer (SSL) and
Transport Layer Security (TLS)
• One of the most widely Two
used security services implementation
choices:
• General-purpose service
implemented as a set of
protocols that rely on Provided as part
TCP of the underlying
protocol suite
• Subsequently became
Internet standard
RFC4346: Transport Embedded in
Layer Security (TLS) specific packages
TLS Concepts
TLS Session TLS Connection
• An association between a • A transport (in the OSI
client and a server layering model
• Created by the Handshake definition) that provides a
Protocol suitable type of service
• Define a set of • Peer-to-peer relationships
cryptographic security
parameters
• Transient
Negotiate Negotiate
Authenticate
encryption and cryptographic
each other
MAC algorithms keys to be used
Also an Specification is
authentication-only quite complex
function, • Numerous RFC’s
implemented using 2401/4302/
4303/4306
an Authentication
Header (AH)
• Because message
authentication is provided
by ESP, the use of AH is
included in IPsecv3 for
backward compatibility
but should not be used in
new applications
Security Associations
• A one-way relationship
between sender and receiver Defined by 3
that affords security for
traffic flow
parameters:
• If a peer relationship is needed Security Parameter Index
for two-way secure exchange (SPI)
then two security associations
are required
IP Destination Address
• Is uniquely identified by the
Destination Address in the
IPv4 or IPv6 header and the Protocol Identifier
SPI in the enclosed extension
header (AH or ESP)
Transport and Tunnel Modes
Transport Mode Tunnel Mode
• Provides protection to the entire
• Extends to the payload of an IP IP packet
packet
• The entire original packet
• Typically used for end-to-end travels through a tunnel from
communication between two one point of an IP network to
hosts another
• ESP encrypts and optionally • Used when one or both ends of
authenticates the IP payload a security association are a
but not the IP header security gateway
• A number of hosts on networks
behind firewalls may engage in
secure communications without
implementing IPsec
Summary
• Secure E-mail and
S/MIME • HTTPS
• MIME • Connection institution
• S/MIME • Connection closure
• DomainKeys • IPv4 and IPv6
identified mail security
• Internet mail architecture • IP security overview
• DKIM strategy • The scope of IPsec
• Security associations
• SSL and TLS • Encapsulating security
• TLS architecture payload
• TLS protocols • Transport and tunnel
• TLS attacks modes
• SSL/TLS attacks