Unit 6
Unit 6
Security
- Dr. G.S. Rawat
E-mail Security
confidentiality
protection from disclosure
authentication
of sender of message
message integrity
protection from modification
non-repudiation of origin
protection from denial by sender
E-mail Architecture
E-mail Architecture
E-mail Security
• Pretty Good Privacy (PGP)
A plaintext message
PGP : Scenarios
Message Integrity
PGP : Scenarios
Compression
PGP : Scenarios
• Segmentation
uniform size units
PGP : Key Rings
PGP : Key Rings …
Alice needs to send a message to another person in the community
• Transport Mode
• Tunnel mode
IPSec: Transport Mode
IPSec in transport mode does not protect the IP header; it only protects the
information coming from the transport layer.
IPSec: Transport Mode
IPSec: Tunnel Mode
• Casual and untrained (in security matters) users are common clients for
Web based services.
Web Security Threats
Web Security Threats
Security Facilities in TCP/IP
Security at Transport Layer
• Secure Sockets Layer (SSL) Protocol
• Transport Layer Security (TLS) Protocol
SSL
SSL : Key Exchange Methods
SSL: Encryption/decryption
algorithms
SSL: Hash Algorithms
SSL: Compression Algorithms
• compression is optional in SSLv3
• No specific compression algorithm is defined for SSLv3
• default compression method is NULL
• a system can use whatever compression algorithm it desires
SSL: Connection and Session
• In a session, one party has the role of a client and the other the role of a
server
• In a connection, both parties have equal roles, they are peers
SSL : Protocols
Transport Layer Security (TLS)
• For example, most browsers come equipped with TLS, and most Web
servers have implemented the protocol.
TLS: Protocol Stack
TLS: Session and Connection
Session
• A TLS session is an association between a client and a server.
• Created by the Handshake Protocol
• Sessions define a set of cryptographic security parameters
Connection
• Connections are peer-to-peer relationships
• Connections are transient
• Every connection is associated with one session
TLS: Protocol
• Handshake Protocol
• Record Protocol
TLS: Record Protocol
• Confidentiality
The Handshake Protocol defines a shared secret key that is used for
conventional encryption of TLS payloads.
• Message Integrity
The Handshake Protocol also defines a shared secret key that is used to
form a message authentication code (MAC)
TLS: Record Protocol Operation
TLS: Other Protocols
TLS: Handshake Protocol
TLS: Handshake Protocol…
TLS: Handshake Protocol …
TLS: Handshake Protocol …
TLS: Handshake Protocol …
TLS: Heartbeat Protocol
Runs on top of the TLS Record Protocol and consists of two message
types: heartbeat_request and heartbeat_response
assures the sender that the recipient is still alive, even though there may
not have been any activity over the underlying TCP connection for a while
generates activity across the connection during idle periods, which avoids
closure by a firewall that does not tolerate idle connections.
HTTPS
• HTTP and SSL to implement secure communication between a Web browser and a Web
server
• Cardholder
• Merchant
• Issuer
• Acquirer
• Payment gateway
• Certification authority (CA)
SET: Components