Crypto U12, SSL

Beschreibung

IYM002 (Unit 12 - Crypto Systems) Mindmap am Crypto U12, SSL, erstellt von jjanesko am 28/04/2013.
jjanesko
Mindmap von jjanesko, aktualisiert more than 1 year ago
jjanesko
Erstellt von jjanesko vor etwa 11 Jahre
84
10

Zusammenfassung der Ressource

Crypto U12, SSL
  1. background
    1. sits on top of TCP
      1. roughly equivalent to TLS
      2. created by IETF
        1. Internet Engineering Task Force
      3. design
        1. designed for open environments where entities do not have a security association
          1. security association: having some relationship where communicating entities have agreed or exchanged security related info or cryptographic keys
          2. security requirements
            1. confidentiality
              1. data origin authentication
                1. entity authentication
                2. can provide 2 types of authentication
                  1. client only
                    1. mutual entitiy
                    2. minimalizes public key operations
                      1. decryption of public key message is placed at the server and saves work for the client
                      2. crypotgraphic primitives: uses hybrid encryption
                        1. public key cryptography
                          1. enables symmetric key establishment
                          2. digital signatures
                            1. sign certificates and facilitate entity authentication
                            2. MACs
                              1. used to provide data origin authentication and entity authentication
                              2. hash functions
                                1. part of MACs, digital signatures, key derivation
                              3. algorithms used
                                1. Flexible standard. Supports many different algorithms and key lengths.
                                  1. during exchange, entities agree upon a "cipher suite"
                                    1. cipher suite - collection of algorithms that communicating entities agree upon
                                  2. common
                                    1. AES in CBC mode
                                      1. HMAC using SHA-256
                                        1. digital signature algorithms
                                          1. RSA
                                            1. DSA
                                        2. protocols used
                                          1. handshake
                                            1. extablish agreements appropriate to secure communication
                                              1. agree upon cipher suite
                                                1. extablish entitity authentication
                                                  1. establish keys for secure channel
                                                  2. sometimes mutual entity authentication is needed in closed systems. basic handshake protocol does not provide this.
                                                    1. so, a "modified handshake protocol" can be used
                                                  3. record
                                                    1. implements secure channel
                                                  4. security issues
                                                    1. will not work if process failures
                                                      1. ex: client does not perform PKCS checks
                                                      2. implementation failures
                                                        1. relies on many cryptographic primitives
                                                        2. key mgt failures
                                                          1. usage failures
                                                            1. security features overestimated and gain a false sense of security
                                                          2. key management
                                                            1. generation
                                                              1. asymmetric keys
                                                                1. through PKMS
                                                                2. symmetric keys
                                                                  1. derived from master secret
                                                                    1. lightweight
                                                                      1. allows many keys to be generated
                                                                        1. reliant on client's ability to generate a random pre-master secret
                                                                      2. establishment
                                                                        1. pre-master key shared through public key encryption
                                                                        2. storage
                                                                          1. private keys must be stored in safe place
                                                                            1. very sensitive, but short-lived
                                                                            2. usage
                                                                              1. key separation enforced
                                                                                1. separate keys for communication between client & server and server & client
                                                                                  1. prevents reflection attacks
                                                                              Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                              ähnlicher Inhalt

                                                                              Crypto U12 (part 1), crypto for mobile telecom
                                                                              jjanesko
                                                                              Crypto U12 (part 2), crypto for mobile telecom
                                                                              jjanesko
                                                                              Crypto U12, WLAN
                                                                              jjanesko
                                                                              Crypto U12 GSM,UTMS Hierarchy Diagram
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                              jjanesko
                                                                              Crypto U3, Theoretical vs. Practical Security
                                                                              jjanesko
                                                                              Crypto U1, Basic Principles
                                                                              jjanesko
                                                                              Crypto U4, Stream Cipher
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Counter Mode
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                              jjanesko