0% found this document useful (0 votes)
12 views

Is Notes

Uploaded by

Uzair Amir
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Is Notes

Uploaded by

Uzair Amir
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Securing Channels Of Communication

Secure Sockets Layer (SSL)


SSL, or Secure Sockets Layer, is a standard security technology that
establishes an encrypted link between a web server and a browser. This
ensures that all data transmitted remains private and integral.

Example:
When a user visits a website using HTTPS (e.g.,
https://www.example.com), SSL is used to encrypt the connection. Users
can see a padlock icon in the address bar, indicating that their connection
is secure.

Importance of SSL:
 Data Encryption: SSL encrypts the data being transmitted,
protecting it from eavesdroppers.

 Authentication: SSL verifies the identity of the parties involved in a


communication, ensuring data is sent to the right server.

 Data Integrity: SSL ensures that the data sent is not altered during
transmission.

 Trust and Credibility: Websites with SSL certificates are perceived


as more trustworthy, encouraging user interaction.

How SSL Works:


1. Handshake Process:

 Client Hello: The client (browser) sends a request to the server to


establish a connection.
 Server Hello: The server responds with its SSL certificate and public
key.
 Key Exchange: The client verifies the server's certificate and then
generates a session key, which is encrypted using the server's public
key and sent to the server.
 Secure Connection Established: Both parties can now communicate
securely using the session key.
2. Encryption Types:

 Symmetric Encryption: Uses the session key for encrypting data


transferred between client and server.
 Asymmetric Encryption: Uses a pair of keys—a public key for
encryption and a private key for decryption—ensuring secure data
transmission.

SSL Certificates:
1. Types of SSL Certificates:

 Domain Validated (DV): Basic validation of domain ownership.

 Organization Validated (OV): More detailed validation including


organization identity.

 Extended Validation (EV): Highest level of validation, displaying a


green address bar in browsers.

2. Certificate Authorities (CAs):


 Trusted entities that issue SSL certificates.

 Examples include Let's Encrypt, DigiCert, and Comodo.

3. Certificate Lifecycle:
 Issuance: The CA issues the certificate after validation.
 Installation: The certificate is installed on the web server.
 Renewal: SSL certificates have an expiration date and must be
renewed to maintain security.

SSL Establishes:
Session Keys:
A session key is a temporary symmetric key used for
encrypting data during a single communication session.

Advantages:
 Speed: Symmetric encryption is faster than asymmetric encryption,
making it suitable for ongoing data transfers.
 Security: Session keys enhance security by being unique to each
session, minimizing the risk of key compromise.

Secure Negotiated Session:


A secure negotiated session is a process
that establishes a safe connection between a client (like a web browser)
and a server, ensuring that data exchanged during the session is encrypted
and protected from eavesdroppers.

Advantages:
 Identity Check: Confirms that both the user and the website are who
they say they are.
 Accuracy: Ensures that the data sent hasn’t been changed or
tampered with.

Benefits of SSL:
 Enhanced Security: Protects sensitive data such as credit card
information and personal details.

 Boosts SEO: Search engines like Google give preference to HTTPS


sites.

 Increased Customer Trust: Users are more likely to engage with


websites that display SSL certificates.

Common Misconceptions:
 SSL is Only for E-commerce: Any website that collects user data or
has forms should implement SSL.

 Free SSL is Not Reliable: While some free SSL options exist, they
can be as secure as paid ones when obtained from reputable CAs.

Transition from SSL to TLS:


 Understanding TLS: Transport Layer Security (TLS) is the
successor to SSL, offering stronger security protocols. While "SSL" is
still commonly used, modern implementations utilize TLS.

 Protocol Versions: SSL 2.0 and 3.0 are outdated and insecure; TLS
1.0, 1.1, 1.2, and the latest 1.3 are now standard.
S-HTTP
S-HTTP (Secure Hypertext Transfer Protocol) is a protocol designed to
secure communications over the internet. Developed in the mid-1990s, S-
HTTP provides a means for secure data transmission between web
servers and clients, primarily addressing the need for privacy and data
integrity in web transactions.

Key Features:
Encryption:
 S-HTTP uses encryption to secure data sent over the internet,
ensuring that unauthorized parties cannot intercept or read the
information.

Authentication:

 It supports various authentication methods, allowing clients to verify


the identity of the server and vice versa. This prevents impersonation
attacks.

Data Integrity:

 S-HTTP ensures that data has not been altered during transmission
through the use of hashing techniques.

Flexible Integration:
 It can be integrated into existing web protocols and is designed to
work with any HTTP-based application.

End-to-End Security:
 S-HTTP provides security for individual messages rather than
establishing a secure connection, making it suitable for various types
of transactions.

How S-HTTP Works:


Message Structure:
S-HTTP operates by encapsulating HTTP messages with additional
security information. The main components include:
 HTTP Header: Standard HTTP headers.
 Security Header: Contains encryption, authentication, and integrity
information.
 Data Payload: The actual data being transmitted.

Encryption Methods:
S-HTTP supports multiple encryption algorithms, such as:
 DES (Data Encryption Standard)
 RSA (Rivest-Shamir-Adleman)
 AES (Advanced Encryption Standard)

Authentication Mechanisms:
Various authentication schemes are used, including:
 Basic authentication
 Digest authentication
 Public key infrastructure (PKI) based methods

Advantages of S-HTTP:
Protocol Compatibility:
 S-HTTP can work with existing HTTP infrastructure without the need
for extensive modifications.

Security on Demand:
 It allows users to enable security for specific transactions rather than
requiring an entire session to be secure.

Message-Level Security:
 Unlike some other protocols, S-HTTP provides security at the
message level, offering flexibility in securing only necessary data.

Disadvantages of S-HTTP:
Limited Adoption:
 S-HTTP has seen limited use compared to its successor, HTTPS
(HTTP Secure), which incorporates SSL/TLS for broader acceptance.
Complexity:
 Implementing S-HTTP can be more complex than HTTPS due to the
need for managing encryption and authentication for individual
messages.

Performance Overhead:
 The additional security layers can introduce latency and reduce
performance, particularly for high-volume transactions.

Comparison with HTTPS:


 Scope of Security: S-HTTP secures individual messages, while
HTTPS secures the entire connection.
 Protocol Usage: HTTPS has become the dominant protocol for
secure web transactions, whereas S-HTTP has largely fallen out of
use.
 Implementation: HTTPS is simpler to implement in many scenarios
due to its integration with SSL/TLS.

S-http Use RSA Encryption Algorithm


S-HTTP (Secure Hypertext Transfer Protocol) is a protocol designed to
provide secure communication over the internet. It uses various
encryption methods to ensure that data transmitted between a client and a
server remains confidential and secure.

RSA Encryption Algorithm:


RSA (Rivest-Shamir-Adleman) is one of the
most widely used public-key cryptographic algorithms. Here's a brief
overview of how it works:

Key Generation:
 Two large prime numbers are selected.
 These primes are multiplied to produce a modulus used in both the
public and private keys.
 An exponent is chosen for the public key, and a corresponding
private exponent is calculated.
Encryption:
 The sender encrypts a message using the recipient's public key.
This process transforms the plaintext into ciphertext.

Decryption:
 The recipient uses their private key to decrypt the ciphertext back
into plaintext.

Role in S-HTTP:
In the context of S-HTTP, RSA can be used for:

Secure Key Exchange: RSA can securely exchange session keys for
symmetric encryption algorithms, which are then used to encrypt the
actual data transmitted.

Digital Signatures: RSA can also verify the authenticity of messages,


ensuring that they haven't been altered during transmission.

VPN
A VPN (Virtual Private Network) is a service that protects your internet
connection by hiding your IP address and encrypting your data, making
your online activities private and secure.

Key Features of VPN:


Privacy Protection: VPNs hide your real IP address, making it hard for
websites to track you.

Data Security: They encrypt your internet traffic, keeping your personal
information safe from hackers.

Bypassing Restrictions: VPNs let you access blocked websites and


content from different regions.

Remote Access: They allow you to securely connect to a private network,


like your company’s network, from anywhere.

Anonymity: VPNs help you browse the internet without revealing your
identity.
How Does a VPN Work:
Encryption: When you connect to a VPN, your data is encrypted before
it travels over the internet. This means that even if someone intercepts
your data, they cannot read it without the decryption key.

Tunneling: A VPN creates a "tunnel" between your device and the VPN
server. This tunnel is secure, preventing outsiders from accessing the data
being transmitted.

IP Address Masking: The VPN server assigns a new IP address to your


connection, making it appear as if you are accessing the internet from the
server’s location rather than your actual location.

Types Of VPNs:
Remote Access VPN: This allows individual users to connect to a remote
network from their personal devices, commonly used for secure access to
corporate networks.

Site-to-Site VPN: This connects entire networks to each other, allowing


offices in different locations to communicate securely.

Personal VPN: Typically used by individuals for privacy and security


while browsing, streaming, or accessing geo-restricted content.

VPN Protocols:
Different VPN protocols offer varying levels of security and speed. Some
common protocols include:

OpenVPN: Very secure and flexible. It's widely used because it works
well on many devices and networks.

IPSec/L2TP: Combines strong security with tunneling. It's good for


protecting your data but can be a bit slower.

PPTP: An older and faster protocol, but not very secure. It's generally not
recommended for sensitive information.

IKEv2: Offers strong security and is great for mobile devices because it
reconnects quickly when your internet changes.
Benefits of VPN:
 Enhanced Security: Protects sensitive data and browsing activity
from hackers and surveillance.

 Online Freedom: Bypass restriction and access blocked websites.

 Avoid Bandwidth Throttling: ISPs (Internet Servive Provider)


sometimes slow down your connection based on your usage; a VPN
can help prevent this.

 Cost Savings: Some users can find better deals on services like flight
bookings or car rentals by appearing to be in a different location.

Limitations of VPN:
 Speed Reduction: Due to the encryption and the additional routing
through VPN servers, users may experience slower internet speeds.

 Legal and Policy Restrictions: In some countries, using a VPN may


be illegal or restricted, and users should be aware of local laws.

 Not All VPNs are Created Equal: Some free VPN services may log
user data or provide inadequate security.

You might also like