Module 3_Part_2 SSL TLS and Data Protection W23(1)
Module 3_Part_2 SSL TLS and Data Protection W23(1)
Network Security
Module 3 part 2
Module 3 Part 2:
SSL/TLS and Data Protection
Transport-Level Security Objectives
• Present an overview of Internet traffic security approaches.
• Introduce Secure Sockets Layer (SSL) and Transport Layer Security
(TLS).
• Understand the cipher suites in Secure Sockets Layer and Transport
Layer Security.
• Present an overview of HTTPS (HTTP over SSL).
Internet Traffic Security
Approaches
More options?
SSL / TLS timeline
• 1995: SSL v2 was the first public release of SSL by Netscape.
• 1996: SSL v3 was a new version that fixed several security design flaws of SSL v2. By
2004, v3 was considered insecure.
Note: Both SSL 2.0 and 3.0 have been deprecated by the Internet Engineering Task Force (IETF), in
2011 and 2015, respectively.
• 1999: TLS v1.0 was released with an SSL fallback mechanism for backwards-
compatibility.
• 2006: TLS v1.1
• 2008: TLSv1.2. Changes included adding cipher-suite-specified pseudorandom functions
(PRFs), adding AES cipher suites, removing IDEA and DES cipher suites, and several other
enhancements.
• 2018: TLS v1.3. The current version of TLS was released in August 2018 (RFC 8446). All
modern browsers support TLS v1.3.
Versions
• SSL version one was never released, version two did but had some
major flaws, SSL version 3 was a rewrite of version two (to fix these
flaws – with limited success) and TLS version 1 an improvement of SSL
version 3.
• Between TLS 1.0 and 1.1, the changes were minor. TLS 1.2 brought
some significant changes and TLS 1.3 has refined and streamlined the
whole process.
SSL (Secure sockets layer)
The main motive behind designing the SSL protocol is to provide privacy
between two communicating applications, such as a client and a server.
Moreover, the protocol is designed to authenticate the server and the
client; SSL requires a reliable transport protocol such as TCP for data
transmission and reception.
Transport layer security (TLS)
TLS is a protocol to establish a secure connection between a client and
a server and ensure privacy and integrity of information during
transmission. It is a cryptographic protocol intended to provide
information security over the Internet.
The TLS encrypts the network connection segments at the application
layer for the transport layer . It uses asymmetric cryptography for key
exchange, symmetric encryption for confidentiality, and message
authentication codes for message integrity.
Organizations can achieve confidentiality, integrity, replay prevention
and authentication when TLS is implemented correctly.
How HTTPS Works
TLS Handshake Protocol allows the client and server to authenticate each other, select
encryption algorithm, and exchange symmetric key prior to data exchange.
TLS Record Protocol provides basic security services to various higher-layer protocols.
TLS Record Protocol
The TLS Record Protocol provides two services for TLS connections:
• Confidentiality: The Handshake Protocol defines a shared secret key
that is used for conventional encryption of TLS payloads.
• Message Integrity: The Handshake Protocol also defines a shared
secret key that is used to form a message authentication code (MAC).
Handshake
Protocol
Recap: Handshake and Record Protocol
TLS Handshake Protocol
This validation level takes the longest and costs the most, but Extended Validation SSL
certificates are more trustworthy than other types of SSL certificates.
Consequently, these certificates are necessary for a website's address to turn the browser
URL bar green, the visual representation for users of a trustworthy TLS-encrypted site.
Large enterprises, financial institutions, and eCommerce stores should obtain Extended
Validation certificates. This is especially crucial if a site or application handles sensitive
customer data, such as passwords, credit card numbers, or names and addresses.
Variations of TLS/SSL
Certificates
• Single Domain SSL Certificate
Single Domain SSL (Secure Socket Layer) Certificate will protect one
domain name only.
For example, if you buy an SSL Certificate with the hostname in the
common name field as www.my-domain-name.com site, and it will not
protect the mail.my-domain-name.com or any other subdomains. This
rule applies to all types of SSL validation.
Single Domain SSL Certs are available in Domain Validated,
Organization Validated, and Extended Validation SSL Certificates types.
Variations of TLS/SSL
Certificates
• Multi-Domain (MD) or Subject Alternative Names (SAN) SSL
Certificates
Also commonly referred to as SAN certificates, multi-domain SSL allow a
single certificate to secure multiple domains, including sub-domains of a
single main domain name or entirely different domain names. One of
these can secure up to 250 unique domains with a single solution.
They provide a convenient option for organizations that own a lot of
domains and are looking for a simplified way to secure them through a
single solution rather than purchasing an individual certificate for each.
Multi-domain SSL certificates are available in DV, OV, and EV validation
options.
Variations of TLS/SSL
Certificates
• Wildcard SSL Certificates
The Wildcard option is used to secure the main domain and an
unlimited number of sub-domains under the main domain.
For example, www.yourwebsite.com, login.yourwebsite.com,
mail.yourwebsite.com, etc. Wildcard certificates offer full encryption
for the subdomains, making them an affordable and effective solution
for most websites. They are available in DV and OV validation options.
SSL / TLS Pros/Cons
Cons: SSL/TLS “Handshake”
Pros: SSL/TLS Security