Tap Proof Encryption
Tap Proof Encryption
Mohd Nizam Omar1, Dahliyusmanto2, Tutut Herawan3, Irham Ahmad4, Angela Amphawan5,
Zurianawati Ibrahim6
1,5
InterNetWorks Lab, School of Computing, Universiti Utara Malaysia, Malaysia
2
Department of Computer Science, Faculty of Engineering, Universitas Riau, Riau
3
Department of Information Systems, University of Malaya, Malaysia
4
Pejabat Setiausaha Kerajaan Negeri Perlis, Malaysia
6
Politeknik Sultan Abdul Halim Mu’adzam Shah, Bandar Darulaman, Malaysia
*Corresponding Author
Received: 10 October 2016, Accepted: 4 November 2016
Published online: 14 February 2017
Abstract: Nowadays world became seriously caring about privacy issue since there are several incidents
occurring, such as SIM card hack, intercepting phone calls, intercepting internet communication, illegal
surveillance program like PRISM and others. One of the ways to overcome this problem is by using Perfect
Forward Secrecy (PFS). There is not much research that successfully proves the effectiveness of PFS in the
Internet. By using real experiment testbed, this research begins with setting up a web-based application server.
Then, the client computer is created. After that, by using another computer as the attacker, another computer
installed with Wireshark app, then, it used to capture the communication between client and web server. This
capturing process repeated for both communication that used PFS and without PFS. Based on the result,
Wireshark successfully captures clear crystal text of data on the communication without the PFS compared to
encrypted text on communication with the PFS. Therefore, by using the PFS, the communication data protected
the communication data. This research hopefully can be used as to provide privacy in the Internet
communication.
1. Introduction
When the world was shocked by news reports about the National Security Agency (NSA) issue,
many researchers in the world try to find the solution to protect data from being compromised. News
reports indicated that NSA has been intercepting phone calls and internet communication of American
citizens and almost high-profile personnel in the world [1]. By looking at the issue, this research
proposes that Perfect Forward Secrecy (PFS) is the one of the solution.
Encryption is used to secure between two communications. With encryption, the eavesdropping
and attacks such as chosen cipher attack, non-repudiation attack and man-in-the middle attack are
difficult to intercept [2, 3]. Currently, there are two types of attack being identified; Browser Exploit
Against SSL/TLS (BEAST) attack and Compression Ratio Info-Leak Mass Exploitation (CRIME)
attack [4]. Encryptions can be defined as a technique or method that used to secure the data from
being stolen or change by others [5].
Encryption also used to protect data from intercept while doing a two way communication.
Nowadays, the web browser is using https and http alone is not secure. This is because the attacker
Tap-Proof Encryption Using Perfect Forward Secrecy In Web Browser
becomes more intelligence while execute hacking. In this research, the researcher will explain the
concept of PFS and the advantages of PFS compare other concept.
The first objectives of this research are to examine the encryption techniques that can overcomes
eavesdropping issues. Nowadays, there are many encryption techniques used in the Internet. One of
the techniques is PFS. PFS is a concept where the public key generates an encryption key in each
session. By that way, the attackers are no longer using the same for the different session1.
The second objectives of this research is to apply PFS in the web browser and web application.
Although PFS has been introduced before, but the awareness and the use of this concept is still low. In
this research, PFS will be applied on the web browser and the web application.
Finally, the last objective of this research is to prove the effectiveness of PFS compared to non-
PFS. This research shows the difference between PFS and non-PFS concept using the real experiment
testbed.
Figure 1(a) shows that same public key is used to generate different encrypted key while on
Figure 1(b) it is shown that different public key generates different encryption key.
Based on the experiment (Section 6), it is shown that communication with PFS enable will resist
against the attacker (information is encrypted). Moreover, if the public key is stolen, the next session
also cannot be compromised because the attacker cannot use the same public key. It is because the
next session used different public key. Therefore, applying PFS will secure the communication
between client and server.
2. Related Works
After a few reports against NSA, many researcher try to find a solution to secure their network.
The best solutions are by enabling PFS in server and browser. Chin-Chen Chang et al. conduct a
research to enable PFS into their mobile device [9]. Zhang Jianhong and Chen Hua execute a research
to enable PFS to their authentication of Email protocol [10]. On the other hand, Vineeta Tiwari et al.
enhance research by Zhang Jianhong and Chen Hua to prove that by PFS in Email protocol can secure
email from cyber-attack issue [11]. Lin-Shung Huang et al. run their research by calculating how
many web in the world using PFS based on the web listed from Alexa [12].
Based on related work discussed previously, most of the researchers agreed that the PFS are
important by applied is on the different environment. In this research, the web browser environment
has been selected because of its popularity connected to the Internet. Moreover, the real testbed
experiment to prove that PFS as the effective method compare to non-PFS in securing web-based
from tap-proof by attackers has been developed.
Based on research by Chin- Chen Chang et al., Zang Jianhong and Chen Hua, and Vineeta Tiwari et
al. research, the PFS will be examined in LAN environment [9,11].
As discussed before, the testing environment of this research will be a Local Area Network
(LAN) as testing environment and this will be expanded into the Wide Area Network (WAN)
environment for the future works.
file
No
Enable SSL
Protocol
End
Yes
No
Enable SSL
Restart apache
service Honor Cipher
Order
No
Enable SSL
Save ssl.conf file Cipher Suite
Yes
Based on Figure 2, there are seven steps needed to configure PFS in the web server. Each step
must be followed accordingly as to ensure that the PFS working both on the web server and the web
browser. When all of these steps have been completed, the experiment by surfing the website address
with http and https in web browser will be followed.
Based on Figure 3, the web server, client and attacker are connected to the switch. When the
client fill in the online form to the web server, an attacker attempts to tap the communication line
between client and web server.
Figure 4 shows that the front page of “eMohon”. This front page is used as the input page of
the experiment of PFS and non-PFS method.
Based on Figure 7 and 8, there are shows that are differences between data capture by
Wireshark using FPS and not using PFS. Figure 7 shows the plaintext where the connection not
encrypted with the PFS concept while in Figure 8. It is shown the ciphertext (this gives proof that PFS
is applied). From Figure 8 also, it shows that the connection were encrypted with the PFS concept that
using Elliptic curve Diffie-Hellman joint RSA cryptosystem, 128 bit keys and using Transport Layer
Security 1.2 (TLS 1.2) protocol.
The testing for searching the string “Fauzi” has been executed. From the searching, there is no
string found in the PFS connection. However, “Fauzi” string has been found in non-PFS connection.
This proof the concept that the PFS encrypts the connection. Table 1 shows the details.
Data
5. Conclusion
From the real experiment testbed using input data “eMohon”, it is proven that this research has
successfully shown that the data is encrypted while using PFS. Otherwise the data still can read by the
6. Future Work
Based on the literature review during executing this research, it is found that some weakness and
opportunity to expand PFS in the future is obtained. First, a method of PFS will be used in mobile
environment can be proposed. This is because the communication using mobile devices is more prone
to be tapped [9]. Secondly, the proposed method will also suggest to test using large scale of network
like Wide Area Network (WAN). This will give more proof of concept of the PFS. Thirdly, Ivan
Ristic from Security Labs found that PFS using DHE significantly slower than other concept [17]. By
referring to this weakness, this research suggests that in future work, we need another solution to
make PFS faster than now.
Acknowledgement. The authors would like to thank InterNetWorks Lab, School of Computing,
Universiti Utara Malaysia, Department of Computer Science, Faculty of Engineering, Universitas
Riau-Indonesia, Department of Information Systems, University of Malaya-Malaysia, Pejabat
Setiausaha Kerajaan Negeri Perlis-Malaysia, Politeknik Sultan Abdul Halim Mu’adzam Shah, Bandar
Darulaman, Kedah-Malaysia.
References
[1] Yuji Suga, “SSL/TLS servers status survey about enabling forward secrecy”, Internet Initiative Japan
Inc., 2014.
[2] Berry Schoenmakers, “Cryptographic Protocols”, Dept of Mathematics and Comp. Science, Technical
University of Eindhoven, Netherland, 1 February 2015.
[3] Susmita Mandal, Sujata Mohanty, “Multi-Party Key-Exchange with Perfect Forward Secrecy”, Dept
of Comp. Science & Engineering National Institute of Technology Rourkela India, 2014.
[4] Albert Fruz, “BEAST vs CRIME Attack”, InfoSec Institute, 14 October 2013.
[5] Fred Kerby, “Understanding Encryption”, The SANS Institute,
http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201107_en.pdf, July 2011.
[6] Gerald J. Popek and Charles S Kline, “Encryption and Secure Computer Networks”, University of
California, Los Angeles, 1979.
[7] G. Julius Ceasar, John F. Kennedy, “Security Engineering : A guide to Building Dependable
Distributed Systems”, University of Cambridge.
[8] Shyam P. Joy and Priya Chandran, “A Formal Framework for Comparing Group Key Agreement
Protocols with Partial Forward Secrecy”, National Institute of Technology Calicut, Kerala, India,
2010.
[9] Chin-Chen Chang, Shih-Yi Lin and Jen-Ho Yang, “Efficient User Authentication and Key
Establishment Protocols with Perfect Forward Secrecy for Mobile Devices”, IEEE Ninth International
Conference on Computer and Information Technology, 2009.
[10] Zhang Jianhong and Chen Hua, “An Efficient Identity-based Authenticated Email Protocol With
Perfect Forward Secrecy”, North China University of Technology (NCUT) Beijing China, 2010.
[11] Vineeta Tiwari, Neha Chandel and Anshul Jain, “Securing Email Applications from Various Cyber
Issue”, International Journal of Emerging Technology and Advanced Engineering, 2013.
[12] Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh and Collin Jackson, “An Experimental Study of
TLS Forward Secrecy Deployments”, Carnegie Mellon University, Microsoft and Stanford University,
2014.
[13] Chrit Sanders, “Practical Packet Analysis”, No Starch Press Inc, 2011.
[14] “Wireshark tutorial”, George Mason University, http://cs.gmu.edu/.../ISA.../Wireshark-Tutorial.pdf.
[15] eMohon application, Pejabat Setiausaha Kerajaan Negeri Perlis, http://emohon.perlis.gov.my
[16] Giuseppe A. Di Lucca, Anna Rita Fasolino, “Testing Web-based application: The state of the art and
future trends”, University of Sannio, Italy, 12 April 2006.
[17] Ivan Ristic, “SSL Labs: Deploying Forward Secrecy”,
https://community.qualys.com/blogs/securitylabs/2013/06/25/ssl-labs-deploying-forward-secrecy,
Security Labs, 5 August 2013.