Unit 5
Unit 5
1. Introduction to SSL
SSL (Secure Sockets Layer) is a cryptographic protocol developed to provide secure communication
over a computer network. Introduced by Netscape in the mid-1990s, SSL evolved through several
versions (SSL 1.0 was never released, SSL 2.0 and SSL 3.0 had security flaws), eventually transitioning
to TLS (Transport Layer Security), which is its modern, more secure counterpart.
2. Purpose of SSL
3. SSL Architecture
SSL operates between the application layer and the transport layer in the OSI model. Its architecture
includes:
• Change Cipher Spec Protocol: Indicates a switch to the newly negotiated cipher suite.
4. Components of SSL
• Cipher Suite: Defines the encryption, key exchange, and hashing algorithms.
• Keys:
o Session Key: Symmetric key used for data encryption after handshake.
2. ServerHello: Server selects cipher suite, sends certificate, and server random.
4. Key Exchange: Client sends a pre-master secret encrypted with server’s public key.
5. Session Key Generation: Both parties derive session keys from the pre-master secret.
• Fatal Alerts: Cause connection termination, e.g., bad certificate, handshake failure.
• Example: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
• Types:
o DV (Domain Validation)
o OV (Organization Validation)
o EV (Extended Validation)
• Revocation Methods:
• E-commerce websites
• Online banking
1. Introduction to TLS
Transport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication
over the internet. TLS is the successor to SSL (Secure Sockets Layer) and addresses many of SSL’s
security flaws. The first version, TLS 1.0, was defined in 1999, and the most recent, TLS 1.3, was
published in 2018.
2. Purpose of TLS
• Forward Secrecy: Uses ephemeral keys to ensure session keys can’t be retroactively
compromised.
3. TLS Architecture
TLS sits between the application and transport layers in the OSI model. Major components include:
4. Components of TLS
• Keys:
2. ServerHello: Selects cipher suite, sends its certificate, and server random.
• Encryption: Performed using AEAD (Authenticated Encryption with Associated Data) in TLS
1.3.
• Types:
• Elimination of Insecure Algorithms: Removed support for RC4, MD5, SHA-1, etc.
• Secure APIs
• E-commerce platforms
• Cloud services
Complete Guide to Secure Electronic Transaction (SET)
1. Introduction to SET
Secure Electronic Transaction (SET) is a security protocol developed by Visa and MasterCard in
collaboration with tech companies like Microsoft and IBM to secure payment card transactions over
insecure networks such as the Internet. It ensures confidentiality, integrity, and authentication in
online financial transactions.
2. Objectives of SET
3. SET Architecture
SET involves multiple entities and a layered security architecture to facilitate secure communication.
Key entities include:
4. Components of SET
• Dual Signature: Ensures data integrity and privacy by binding payment and order information
while keeping them separate.
• Payment Gateway Software: Validates cardholder's certificate and processes the payment.
5. SET Certificate Hierarchy
2. Purchase Request: Cardholder initiates purchase and sends order and encrypted payment
info.
3. Dual Signature: Ensures order and payment info are linked but cannot be seen by
unauthorized parties.
• The combined hash is then encrypted using the cardholder’s private key.
• Ensures that the merchant sees only the order, and the payment gateway sees only the
payment info.
• Dual Signature: Custom SET feature for data separation and integrity.
9. Advantages of SET
• Strong authentication and data confidentiality.
• Complex infrastructure
• Cost of implementation
1. Introduction to Firewalls
A firewall is a network security device or software that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. Its primary purpose is to establish a barrier
between a trusted internal network and untrusted external networks, such as the Internet.
• All Traffic Must Pass Through the Firewall: This ensures no direct access to internal
resources without inspection.
• Only Authorized Traffic Is Allowed: Rules are defined based on IP addresses, protocols,
ports, and applications.
• Security Policy Enforcement: The firewall enforces the organization’s security policy
consistently.
• Audit and Logging: Maintain logs of all activities for analysis and compliance.
• Least Privilege: Services and user access should operate with the minimum necessary
permissions.
3. Types of Firewalls
• Inspect packets independently and filter based on IP address, port, and protocol.
• Make decisions based on the context of traffic (e.g., TCP handshake state).
• Combine traditional firewall functions with deep packet inspection, intrusion prevention, and
application awareness.
2. Objectives of IDS
• Log Security Events: Maintain records for forensic and compliance purposes.
• Generate Alerts: Notify administrators or security tools when threats are detected.
3. Types of IDS
• Monitors entire network traffic passing through a specific point (e.g., gateway).
4. Components of IDS
5. Logging and Reporting: Records events and provides reports for analysis.
7. Advantages of IDS
8. Limitations of IDS
• False positives and false negatives
9. Applications of IDS
1. What is PGP?
Pretty Good Privacy (PGP) is a data encryption and decryption program used for securing emails,
files, and other forms of communication. Developed by Phil Zimmermann in 1991, PGP provides
cryptographic privacy and authentication through a combination of symmetric and asymmetric
encryption.
2. Objectives of PGP
• Provide non-repudiation
3. Key Features
• Hybrid Cryptosystem: Uses both symmetric (for speed) and asymmetric (for key exchange)
encryption.
Encryption Process:
2. Session Key Generation: A random session key is generated for symmetric encryption.
3. Message Encryption: The compressed message is encrypted with the session key (symmetric
encryption, e.g., AES).
4. Session Key Encryption: The session key is encrypted using the recipient's public key
(asymmetric encryption, e.g., RSA).
5. Output: The encrypted session key + encrypted message is sent to the recipient.
Decryption Process:
1. Session Key Decryption: The recipient uses their private key to decrypt the session key.
2. The hash is encrypted with the sender’s private key to create a digital signature.
Signature Verification:
1. The recipient decrypts the digital signature with the sender’s public key to get the hash.
5. Components of PGP
• Keyrings:
8. Applications of PGP
• Secure email communication
• File encryption
• Secure backups
9. Advantages of PGP
• Cross-platform support
1. What is S/MIME?
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and
signing of MIME data, primarily used for securing email communication. It is widely supported by
modern email clients and provides end-to-end security.
2. Objectives of S/MIME
Encryption Process:
1. The email content is converted to MIME format.
3. The symmetric key is then encrypted using the recipient's public key.
4. The encrypted message + encrypted symmetric key + sender’s certificate are sent to the
recipient.
Decryption Process:
1. The recipient uses their private key to decrypt the symmetric key.
3. The email client verifies the digital signature using the sender’s public key (from the
certificate).
2. The hash is encrypted using the sender’s private key to form the digital signature.
3. The digital signature and sender’s certificate are attached to the email.
4. Components of S/MIME
5. Features of S/MIME
8. Advantages of S/MIME
9. Limitations of S/MIME
Configuration Easier for users in managed environments More flexible but complex