19
1 Cryptography – SSL/TLS

Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

1

Cryptography –SSL/TLS

Page 2: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

History

• Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent and secure transactions.

• In 1997 an Open Source version of Netscape’s patented version was created, which is now OpenSSL.

• In 1999 the existing protocol was extended by a version now known as Transport Layer Security (TLS).

• By convention, the term "SSL" is used even when technically the TLS protocol is being used.

2

Page 3: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

SSL/TLS Protocol

3

Encrypted SSL/TLS data [HTTP]

Transport (TCP)

Internet

Network Access

Application (HTTP)

Page 4: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

TLS/SSL: What it does

4

• Confidentiality– Encryption

• Integrity– Keyed hash (HMAC): TLS (authentication!)– Hash (MAC): SSL

• Authentication– certificates

Page 5: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

SSL/TLS Operations

5

• Client connects to the server– To access a resource

• Public-key cryptography during initial handshake to authenticate and exchange session keys– PKI (X.509 Certificates)

• Symmetric key cryptography to encrypt and hash data– Master secret (shared secret) generated– Separate Encryption and Hashing keys from the master

secret

Page 6: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

How SSL/TLS Works – Part 1

6

Master Secret (shared)• Encryption key

• Hashing key

Encrypted data

PKI

Page 7: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

PKI – public key infra

7

• Digital (X.509) certificates – associates a public key with an individual or organization

• public key of the subject!

Version

Serial Number

Signature Algorithm

Issuer Name

Validity Period

Subject Name

Subject Public Key

Issuer ID

Subject ID

Extensions (CRL)

CA Digital Signature

Version of X.509

Uniquely identifies the certificate

Algorithms used by the CA to sign the cert

Id of the CA (that issued the cert)

Cert validityThe cert owner

Owner’s public key

Extra info (Issuer of the cert)

Extra info (owner of the cert)

Digital Signature of the CA

Page 8: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

PKI – Chain of Trust

8

• Root CA– Self-signed– Issue and sign ICA’s

certificate

• Intermediate CA– Issue and sign EE

certificate

• End Entity

Root CA

ICA ICA

EE EE EE EE

Page 9: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

PKI – Example

9

• Client (browser) sends https request to google.com– browsers have trusted CA certificates

stored

• Web server sends back google.com’scertificate– Signed by Google ICA, plus– Google ICA’s certificate signed by root CA

(GeoTrust)

• Verify the certificates up the chain of trust– Once successfully verified, use the public

key

Root CA Cert

Signature (self-signed)

google.comCert

Signature (signed by ICA)

ICA Cert

Signature (signed by root)

Page 10: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

How SSL/TLS Works – Part 2

10

Master Secret (shared)• Encryption key

• Hashing key

Encrypted data

Symmetric Encryption

Page 11: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Symmetric Encryption

11

• Once the server’s public key is verified up the chain of trust– The client generates a pre-master secret

• C-random & S-random– Sends to the server encrypted with server’s public key

• Both client and server generates the Master Secret– Uses the pre-master secret, C-random, and S-random with

the agreed key exchange cipher (eg: DH)

• Separate Encryption and Hashing keys generated from the Master secret– All future communication hashed and encrypted using the

symmetric keys

Page 12: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Trusted vs Non-trusted Certificate

12

Page 13: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Certificate Authority

13

Page 14: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

WoSign

14

https://groups.google.com/forum/m/#!topic/mozilla.dev.security.policy/k9PBmyLCi8I/discussion

Page 15: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Introducing Let’s Encrypt

15

• An open source CA– Proof your domain to get your digital (TLS/SSL) certificate– https://letsencrypt.org

Page 16: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Let’s Encrypt chain

16

• Let’s Encrypt ICA (X3) cross-signed by DST (IdenTrust)– Until ISRG (Internet Security Research Group) is trusted by

everyone https://letsencrypt.org/2018/08/06/trusted-by-all-major-root-programs.html

Page 17: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Introducing Let’s Encrypt

17

• Browsers and OS– https://community.letsencrypt.org/t/which-browsers-and-

operating-systems-support-lets-encrypt/4394

• Check your browser– https://wiki.apnictraining.net– (signed by Let’s Encrypt)

Page 18: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Lab Exercise

18

Page 19: Cryptography – SSL/TLS · • Public-key cryptography during initial handshake to authenticate and exchange session keys – PKI (X.509 Certificates) • Symmetric key cryptography

Setup

• Follow lab manual ssl_lab.pdf