Crypto U12, SSL

Descripción

(Unit 12 - Crypto Systems) IYM002 Mapa Mental sobre Crypto U12, SSL, creado por jjanesko el 28/04/2013.
jjanesko
Mapa Mental por jjanesko, actualizado hace más de 1 año
jjanesko
Creado por jjanesko hace alrededor de 11 años
84
10

Resumen del Recurso

Crypto U12, SSL
  1. background
    1. sits on top of TCP
      1. roughly equivalent to TLS
      2. created by IETF
        1. Internet Engineering Task Force
      3. design
        1. designed for open environments where entities do not have a security association
          1. security association: having some relationship where communicating entities have agreed or exchanged security related info or cryptographic keys
          2. security requirements
            1. confidentiality
              1. data origin authentication
                1. entity authentication
                2. can provide 2 types of authentication
                  1. client only
                    1. mutual entitiy
                    2. minimalizes public key operations
                      1. decryption of public key message is placed at the server and saves work for the client
                      2. crypotgraphic primitives: uses hybrid encryption
                        1. public key cryptography
                          1. enables symmetric key establishment
                          2. digital signatures
                            1. sign certificates and facilitate entity authentication
                            2. MACs
                              1. used to provide data origin authentication and entity authentication
                              2. hash functions
                                1. part of MACs, digital signatures, key derivation
                              3. algorithms used
                                1. Flexible standard. Supports many different algorithms and key lengths.
                                  1. during exchange, entities agree upon a "cipher suite"
                                    1. cipher suite - collection of algorithms that communicating entities agree upon
                                  2. common
                                    1. AES in CBC mode
                                      1. HMAC using SHA-256
                                        1. digital signature algorithms
                                          1. RSA
                                            1. DSA
                                        2. protocols used
                                          1. handshake
                                            1. extablish agreements appropriate to secure communication
                                              1. agree upon cipher suite
                                                1. extablish entitity authentication
                                                  1. establish keys for secure channel
                                                  2. sometimes mutual entity authentication is needed in closed systems. basic handshake protocol does not provide this.
                                                    1. so, a "modified handshake protocol" can be used
                                                  3. record
                                                    1. implements secure channel
                                                  4. security issues
                                                    1. will not work if process failures
                                                      1. ex: client does not perform PKCS checks
                                                      2. implementation failures
                                                        1. relies on many cryptographic primitives
                                                        2. key mgt failures
                                                          1. usage failures
                                                            1. security features overestimated and gain a false sense of security
                                                          2. key management
                                                            1. generation
                                                              1. asymmetric keys
                                                                1. through PKMS
                                                                2. symmetric keys
                                                                  1. derived from master secret
                                                                    1. lightweight
                                                                      1. allows many keys to be generated
                                                                        1. reliant on client's ability to generate a random pre-master secret
                                                                      2. establishment
                                                                        1. pre-master key shared through public key encryption
                                                                        2. storage
                                                                          1. private keys must be stored in safe place
                                                                            1. very sensitive, but short-lived
                                                                            2. usage
                                                                              1. key separation enforced
                                                                                1. separate keys for communication between client & server and server & client
                                                                                  1. prevents reflection attacks
                                                                              Mostrar resumen completo Ocultar resumen completo

                                                                              Similar

                                                                              Crypto U12 (part 1), crypto for mobile telecom
                                                                              jjanesko
                                                                              Crypto U12 (part 2), crypto for mobile telecom
                                                                              jjanesko
                                                                              Crypto U12, WLAN
                                                                              jjanesko
                                                                              Crypto U12 GSM,UTMS Hierarchy Diagram
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                              jjanesko
                                                                              Crypto U3, Theoretical vs. Practical Security
                                                                              jjanesko
                                                                              Crypto U1, Basic Principles
                                                                              jjanesko
                                                                              Crypto U4, Stream Cipher
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Counter Mode
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                              jjanesko