internet security basics

32
Internet Security Basics

Upload: bipin-jethwani

Post on 08-Jun-2015

640 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Security Basics

Internet Security Basics

Page 2: Internet Security Basics

Symmetric Encryption

Page 3: Internet Security Basics

Symmetric key should NOT travel un-protected over a network. Following are two algorithms normally used to exchange the keys.

1. Diffie-Hellman key exchange (D-H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.

2. RSA as key exchange algorithm.

Page 4: Internet Security Basics

Alice Bob

Page 5: Internet Security Basics

Encryption Algorithms

1. RC4 (Rivest Cipher 4) was designed by Ron Rivest of RSA Security in 1987. RC4 5% performance degradation.

2. DES (Data Encryption Standard (IBM)) 24% performance degradation.

Page 6: Internet Security Basics

PKI Encryption

Page 7: Internet Security Basics
Page 8: Internet Security Basics

Important: These forms the basis for all the internet security protocols.

Page 9: Internet Security Basics

Alice Bob

Page 10: Internet Security Basics
Page 11: Internet Security Basics
Page 12: Internet Security Basics
Page 13: Internet Security Basics

PKI Digital Signatures

Page 14: Internet Security Basics
Page 15: Internet Security Basics

Third PKI-Rule Satisfied.

Page 16: Internet Security Basics
Page 17: Internet Security Basics
Page 18: Internet Security Basics

First & Third PKI Rule Satisfied.

Unique sequence number is used inside the Digital Signatures to prevent interception and replay of the messages.

Page 19: Internet Security Basics
Page 20: Internet Security Basics
Page 21: Internet Security Basics

Certificates and Certificate Authorities

Page 22: Internet Security Basics
Page 23: Internet Security Basics

Here’s a trust relationship between a customer, his bank and his credit card company.

When he drops a cheque at his bank to pay-off his credit card bill, he is assured that his credit card will be paid.

Page 24: Internet Security Basics

Some of the well known are: 1. Verisign, Inc.2. Entrust Technologies.3. Baltimore Technologies.4. Thawte.

You can be a CA on your own using free and open source OpenSSL.

Page 25: Internet Security Basics
Page 26: Internet Security Basics
Page 27: Internet Security Basics
Page 28: Internet Security Basics

Carries Bobs Distinguished Name (DN) and his Public Key with other details.

CA will do a lot of physical validations and issue a certificate to Bob. Normally Bob gets that either through email or CA requests him to download it from their web site.

Page 29: Internet Security Basics
Page 30: Internet Security Basics

You can store the certificate on your file system as a file (.cer), right click and check the properties.

You can check the CAs and trusted parties certificates installed on your browser.

Internet Explorer > Tools > Internet Options > Content > Certificates (button)

Page 31: Internet Security Basics

X.509 v3 Structure of a certificate

The structure of an X.509 v3 digital certificate is as follows:• Certificate

• Version • Serial Number • Algorithm ID • Issuer • Validity

– Not Before – Not After

• Subject • Subject Public Key Info

– Public Key Algorithm – Subject Public Key

• Issuer Unique Identifier (Optional) • Subject Unique Identifier (Optional) • Extensions (Optional)

• Certificate Signature Algorithm • Certificate Signature

Issuer and subject unique identifiers were introduced in Version 2, Extensions in Version 3.

Page 32: Internet Security Basics

Certificate filename extensions

Common filename extensions for X.509-certificates are:

• .DER - DER encoded certificate

• .PEM - (Privacy Enhanced Mail) Base64 encoded DER certificate, enclosed between "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" (also sometimes represented as .CER)

• .P7B - See .p7c

• .P7C - PKCS#7 SignedData structure without data, just certificate(s) or CRL(s)

• .PFX - See .p12

• .P12 - PKCS#12, may contain certificate(s) (public) and private keys (password protected)

• PKCS#7 is a standard for signing or encrypting (officially called "enveloping") data. Since the certificate is needed to verify signed data, it is possible to include them in the SignedData structure. A .P7C-file is just a degenerated SignedData structure, without any data to sign.

• PKCS#12 evolved from the PFX (Personal inFormation eXchange) standard and is used to exchange public and private objects in a single file.

• A .PEM-file may contain certificate(s) or private key(s), enclosed between the appropriate BEGIN/END-lines (CERTIFICATE or RSA PRIVATE KEY).

PeopleSoft uses PEM

format.