Crypto U12, SSL

Description

IYM002 (Unit 12 - Crypto Systems) Mind Map on Crypto U12, SSL, created by jjanesko on 28/04/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko almost 11 years ago
84
10

Resource summary

Crypto U12, SSL
  1. background
    1. sits on top of TCP
      1. roughly equivalent to TLS
      2. created by IETF
        1. Internet Engineering Task Force
      3. design
        1. designed for open environments where entities do not have a security association
          1. security association: having some relationship where communicating entities have agreed or exchanged security related info or cryptographic keys
          2. security requirements
            1. confidentiality
              1. data origin authentication
                1. entity authentication
                2. can provide 2 types of authentication
                  1. client only
                    1. mutual entitiy
                    2. minimalizes public key operations
                      1. decryption of public key message is placed at the server and saves work for the client
                      2. crypotgraphic primitives: uses hybrid encryption
                        1. public key cryptography
                          1. enables symmetric key establishment
                          2. digital signatures
                            1. sign certificates and facilitate entity authentication
                            2. MACs
                              1. used to provide data origin authentication and entity authentication
                              2. hash functions
                                1. part of MACs, digital signatures, key derivation
                              3. algorithms used
                                1. Flexible standard. Supports many different algorithms and key lengths.
                                  1. during exchange, entities agree upon a "cipher suite"
                                    1. cipher suite - collection of algorithms that communicating entities agree upon
                                  2. common
                                    1. AES in CBC mode
                                      1. HMAC using SHA-256
                                        1. digital signature algorithms
                                          1. RSA
                                            1. DSA
                                        2. protocols used
                                          1. handshake
                                            1. extablish agreements appropriate to secure communication
                                              1. agree upon cipher suite
                                                1. extablish entitity authentication
                                                  1. establish keys for secure channel
                                                  2. sometimes mutual entity authentication is needed in closed systems. basic handshake protocol does not provide this.
                                                    1. so, a "modified handshake protocol" can be used
                                                  3. record
                                                    1. implements secure channel
                                                  4. security issues
                                                    1. will not work if process failures
                                                      1. ex: client does not perform PKCS checks
                                                      2. implementation failures
                                                        1. relies on many cryptographic primitives
                                                        2. key mgt failures
                                                          1. usage failures
                                                            1. security features overestimated and gain a false sense of security
                                                          2. key management
                                                            1. generation
                                                              1. asymmetric keys
                                                                1. through PKMS
                                                                2. symmetric keys
                                                                  1. derived from master secret
                                                                    1. lightweight
                                                                      1. allows many keys to be generated
                                                                        1. reliant on client's ability to generate a random pre-master secret
                                                                      2. establishment
                                                                        1. pre-master key shared through public key encryption
                                                                        2. storage
                                                                          1. private keys must be stored in safe place
                                                                            1. very sensitive, but short-lived
                                                                            2. usage
                                                                              1. key separation enforced
                                                                                1. separate keys for communication between client & server and server & client
                                                                                  1. prevents reflection attacks
                                                                              Show full summary Hide full summary

                                                                              Similar

                                                                              Crypto U12 (part 1), crypto for mobile telecom
                                                                              jjanesko
                                                                              Crypto U12, WLAN
                                                                              jjanesko
                                                                              Crypto U12 (part 2), crypto for mobile telecom
                                                                              jjanesko
                                                                              Crypto U12 GSM,UTMS Hierarchy Diagram
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                              jjanesko
                                                                              Crypto U1, Basic Principles
                                                                              jjanesko
                                                                              Crypto U3, Theoretical vs. Practical Security
                                                                              jjanesko
                                                                              Crypto U4, Stream Cipher
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                              jjanesko
                                                                              Crypto U4, Block Cipher, Counter Mode
                                                                              jjanesko