Unit-V: WWW, HTTP and Digital Signature
Unit-V: WWW, HTTP and Digital Signature
Fig. Browser
Server
• The Web page is stored at the server. Each time a client request arrives,
the corresponding document is sent to the client. To improve efficiency,
servers normally store requested files in a cache in memory; memory is
faster to access than disk.
• A server can also become more efficient through multithreading or
multiprocessing. In this case, a server can answer more than one request
at a time.
Uniform Resource Locator (URL)
• A client that wants to access a Web page needs the address. To facilitate
the access of documents distributed throughout the world, HTTP uses
locators.
• The uniform resource locator (URL) is a standard for specifying any kind of
information on the Internet. The URL defines four things: protocol, host
computer, port, and path
• The protocol is the client/server program used to retrieve the
document.
• Many different protocols can retrieve a document; among them is
FTP or HTTP. The most common today is HTTP.
• Web pages are usually stored in computers, and computers are given
alias names that usually begin with the characters "www".
• The URL can optionally contain the port number of the server.
• If the port is included, it is inserted between the host and the path,
and it is separated from the host by a colon.
• Path is the pathname of the file where the information is located.
• Note that the path can itself contain slashes that, in the UNIX
operating system, separate the directories from the subdirectories
and files.
Cookies
• A cookie, also known as an HTTP cookie, web cookie, or browser
cookie, is a small piece of data sent from a website and stored in
a user's web browser while the user is browsing that website.
• Every time the user loads the website, the browser sends the
cookie back to the server to notify the website of the user's
previous activity.
• Cookies were designed to be a reliable mechanism for websites
to remember stateful information (such as items in a shopping
cart) or to record the user's browsing activity (including clicking
particular buttons, logging in, or recording which pages were
visited by the user as far back as months or years ago).
• The main purpose of cookies is to identify users and possibly
prepare customized web pages for them.
• When you enter a web site using cookies, you may be asked to
fill out a form providing such information as your name and
interests. This information is packaged into a cookie and sent to
your Web browser which stores it for later use.
• The next time you go to the same Web site, your browser will
send the cookie to the Web server.
• The server can use this information to present you with custom
Web pages. So, for example, instead of seeing just a generic
welcome page you might see a welcome page with your name
on it.
Web Documents
• The documents in the WWW can be grouped into three broad categories:
• The category is based on the time at which the contents of the document
are determined.
Static Documents
• Static documents are fixed-content documents that are created and stored in a
server.
• The client can get only a copy of the document.
• In other words, the contents of the file are determined when the file is created,
not when it is used. When a client accesses the document, a copy of the document
is sent. The user can then use a browsing program to display the document.
Request Message
A request message consists of a request line, a header, and sometimes a body.
• A digital signature can provide three out of the five services we mentioned for a
security system: message integrity, message authentication, and
nonrepudiation.
• Note that a digital signature scheme does not provide confidential
communication.
• If confidentiality is required, the message and the signature must be encrypted
using either a secret-key or public-key cryptosystem.
Message Integrity
• The integrity of the message is preserved even if we sign the whole message
because we cannot get the same signature if the message is changed.
• The signature schemes today use a hash function in the signing and verifying
algorithms that preserve the integrity of the message.
Message Authentication
• A secure signature scheme, like a secure conventional signature (one that
cannot be easily copied), can provide message authentication.
• Bob can verify that the message is sent by Alice because Alice's public key is
used in verification. Alice's public key cannot create the same signature as Eve's
private key.
Message Nonrepudiation
• If Alice signs a message and then denies it, can Bob later prove that Alice
actually signed it? For example, if Alice sends a message to a bank (Bob)
and asks to transfer $10,000 from her account to Ted's account, can Alice
later deny that she sent this message?
• With the scheme we have presented so far, Bob might have a problem.
• Bob must keep the signature on file and later use Alice's public key to
create the original message to prove the message in the file and the newly
created message are the same.
• This is not feasible because Alice may have changed her private/public key
during this time; she may also claim that the file containing the signature is
not authentic.
• One solution is a trusted third party. People can create a trusted party
among themselves.
Fig. using a trusted center for non rupudiation
Signature Schemes
• Several signature schemes have evolved
during the last few decades. Some of them
have been implemented. Such as RSA and DSS
(Digital Signature Standard) schemes.
Authentication Protocols
• Authentication Based on a Shared Secret Key
• Establishing a Shared Key: Diffie-Hellman
• Authentication Using a Key Distribution Center
• Authentication Using Kerberos
• Authentication Using Public-Key Cryptography
Authentication Based on a Shared Secret
Key
7. In TCP, the application process on both sides of the connection can independently
close its half of the connection.
8. The combinations of transitions from the ESTABLISHED state to CLOSED state are:
ESTABLISHED FIN_WAIT_1 FIN_WAIT_2 TIME_WAIT CLOSED (this side
closes first)
ESTABLISHED CLOSE_WAIT LAST_ACK CLOSED (other side closes first)
ESTABLISHED FIN_WAIT_1 CLOSING TIME_WAIT CLOSED (both side close
simultaneously)