E-commerce security: SSL/TLS, SET and others. 4.1

Similar documents
Chapter 8 Web Security

Transport Level Security

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

CSCE 715: Network Systems Security

Chapter 4: Securing TCP connections

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

Transport Layer Security

Overview. SSL Cryptography Overview CHAPTER 1

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Security Protocols. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Universität Hamburg. SSL & Company. Fachbereich Informatik SVS Sicherheit in Verteilten Systemen. Security in TCP/IP. UH, FB Inf, SVS, 18-Okt-04 2

Chapter 7. WEB Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Secure Socket Layer. Security Threat Classifications

Understand the TLS handshake Understand client/server authentication in TLS. Understand session resumption Understand the limitations of TLS

But where'd that extra "s" come from, and what does it mean?

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Transport Layer Security

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Cryptography (Overview)

Security Protocols and Infrastructures. Winter Term 2010/2011

Chapter 5. Transport Level Security

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

E-commerce security: SSL/TLS, SET and others. 4.2

Encryption. INST 346, Section 0201 April 3, 2018

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Chapter 6: Security of higher layers. (network security)

Internet security and privacy

Security Protocols and Infrastructures. Winter Term 2015/2016

Cryptography and Network Security

MTAT Applied Cryptography

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

Web Security. Mahalingam Ramkumar

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

SSL/TLS CONT Lecture 9a

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Information Security CS 526

CS 356 Internet Security Protocols. Fall 2013

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

Transport Layer Security

Displaying SSL Configuration Information and Statistics

Security Protocols and Infrastructures

CPSC 467: Cryptography and Computer Security

(2½ hours) Total Marks: 75

SSL/TLS. How to send your credit card number securely over the internet

Presented by: Ahmed Atef Elnaggar Supervisor: Prof. Shawkat K.Guirguis

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Data Security and Privacy. Topic 14: Authentication and Key Establishment

C O M P U T E R S E C U R I T Y

MTAT Applied Cryptography

Introduction to Cryptography Lecture 11

ecure Sockets Layer, or SSL, is a generalpurpose protocol for sending encrypted

Digital Certificates Demystified

Managing SSL certificates in the ServerView Suite

14. Internet Security (J. Kurose)

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Lecture for February 10, 2016

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Chapter 12 Security Protocols of the Transport Layer

Secure Web Transactions. Sridhar Iyer K R School of Information Technology IIT Bombay

L13. Reviews. Rocky K. C. Chang, April 10, 2015

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Lecture 10: Communications Security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

White Paper for Wacom: Cryptography in the STU-541 Tablet

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

CS 395T. Analyzing SET with Inductive Method

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Keywords Session key, asymmetric, digital signature, cryptosystem, encryption.

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

A simple approach of Peer-to-Peer E-Cash system

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cipher Suite Configuration Mode Commands

CS 161 Computer Security

Introduction and Overview. Why CSCI 454/554?

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Security: Focus of Control

Computer Security. Two main issues are current regarding security for computer communication systems

Introduction. INF3510 Information Security. Lecture 10: Communications Security. Outline. Network Security Concepts. University of Oslo Spring 2018

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

TLS. RFC2246: The TLS Protocol. (c) A. Mariën -

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec

CS November 2018

Auth. Key Exchange. Dan Boneh

Security: Focus of Control. Authentication

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

CIS 5373 Systems Security

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise

CT30A8800 Secured communications

The Design of an Anonymous and a Fair Novel E-cash System

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

KALASALINGAM UNIVERSITY

Transcription:

E-commerce security: SSL/TLS, SET and others. 4.1 1

Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties: Buyer (payer) Merchant (payee) Issuer (bank interacting with payer) Acquirer (bank interacting with payee) Arbiter Other entities (card associations, clearinghouses ) 2

Electronic Payment Systems: Classification Simile to real-world payment systems Cash Check Credit card Stored Value (e.g., debit cards, pre-paid cards, smart cards) Accumulating Balance 3

Electronic Payment Systems: Credit Card Represents an account that extends credit to consumers, permitting consumers to purchase items while deferring payment, and allows consumers to make payments to multiple vendors at one time Credit card associations Nonprofit associations (Visa, MasterCard) that set standards for issuing banks Issuing banks Issue cards and process transactions Processing centers (clearinghouses) Handle verification of accounts and balances 4

Credit card - Participants Processor Processor Card Association 1 3 2 Issuing Bank Issues card Extends credit Assumes risk of card Cardholder reporting Credit card issuing Consumer Purchase Merchant s credit card account issuing Merchant Merchant Bank (Acquirer) Sets up merchant Extends credit Assumes risk of merchant Funds merchant 5

Credit card Process flow Purchase at merchant s shop using a POS (Point of Sale) terminal 1. Authorization 2. Batching 3. Clearing and settlement 4. Funding 6

Credit card-based electronic payment systems Problem: communicate credit card # and purchasing data securely through Internet (at least) Authentication of buyer and merchant Confidential transmissions Systems vary by type of public-key encryption type of symmetric encryption message digest algorithm number of parties having private keys number of parties having certificates SOURCE: MICHAEL I. SHAMOS 7

Credit card-based electronic payment systems SSL (Netscape, 1994) 1 or 2 parties have private keys TLS (IETF, 1999-2008) IETF version of SSL - stronger algorithms The Transport Layer Security (TLS) Protocol Version 1.2 (RFC 5246), 2008 CyberCash (CyberCash Corp., 1995) SEPP (MasterCard, IBM, Netscape,1995) STT (VISA, Microsoft, 1995) SET (Visa+Mastercard, 1996) All parties have digital certificates 3-D Secure (Visa, 2002) On-line authentication VERY IMPORTANT. USAGE INCREASING OBSOLETE VERY SLOW ACCEPTANCE; DEAD RAPID EXPANSION 8

Electronic payment systems Credit card + SSL: Participants Client Response Purchase request Server Card issuing Authorization request Inter bank Authorization Internet Consumers Bank Merchants Bank 9

Secure Sockets Layer (SSL) = Security protocol: Created by Netscape (1994) Works between the application level and the transport protocol (usually TCP/IP). Needs a reliable end-to-end transport service Adds security features to information stream (confidentiality, integrity ) Provides the service to protocols at application level: HTTP (https), FTP, Telnet, POP 3, SMTP,... 10

Secure Sockets Layer (SSL) User Applications HTTP (S) FTP (S) Other Protocols Secure Sockets Layer (SSL) Transport Control Protocol (TCP) Internet Protocol (IP) 11

Secure Sockets Layer (SSL) Characteristics: Establishes a secure channel on the transport level between two parties NOT a payment protocol -- can be used for any secure communications, like credit card numbers Supports compression (optional) Provides various security services 12

Secure Sockets Layer (SSL) Security services: Peers authentication: X.509 v3 certificates Server Client (optional) Integrity: MACs Confidentiality: symmetric encryption with a session key 13

Secure Sockets Layer (SSL) HTTP (s), FTP (s), SMTP (s), Handshake protocol Change Cipher Spec protocol Alert protocol Record protocol TCP IP 14

Secure Sockets Layer (SSL) 2 Sub-layers: Higher layer: Handshake protocol Authenticates peers identity Negotiates cipher suite Establishes secret information Change Cipher Spec protocol Alert protocol Lower layer: Record protocol Packs/unpacks records, compression (optional) MAC calculation/verification and encryption/decryption 15

SSL: Handshake Protocol Most complex protocol within SSL Permits mutual authentication of server and client (optionally) Negotiates the cryptographic algorithms: Key exchange Encryption and MAC Negotiates the cryptographic keys A master secret from which keys for encryption and MAC are derived Takes place before the transmission of application data 16

SSL Handshake Protocol - Overview Phase 1: Establish security capabilities Phase 2: Server authentication and key exchange Phase 3: Client authentication and key exchange Phase 4: Finish Source: W. Stallings and L. Brown. Slides of Chapter 17. Cryptography and Network Security. 4 th edition. 17

SSL Handshake Protocol: Key Exchange algorithm RSA Certified server s public key Client sends premaster secret encrypted (enveloped) Fixed Diffie-Hellman (DH) Certified server s DH public parameters Client sends its DH public parameters in certificate or key exchange message 18

SSL Handshake Protocol: Key Exchange algorithm Ephemeral Diffie-Hellman (EDH) Peers exchange their DH public parameters signed with their RSA or DSS private keys Corresponding certified RSA or DSS public keys Anonymous Diffie-Hellman (ADH) Non authenticated DH public parameters Vulnerable to Man-in-the-middle attacks 19

Diffie-Hellmann key exchange New Directions in Cryptography, Whitfield Diffie, Martin E. Hellman. IEEE Transactions in Information Theory, vol. IT-22, pp 664-654. Noviembre de 1976 20

Diffie-Hellmann key exchange A and B negotiate the following 2 public values: p: a very big prime number (> 512 bits) g: a primitive root (generator) A chooses a very large random integer x and sends to B: X = g x mod p B chooses a very large random integer y and sends to A: Y = g y mod p A and B calculate respectively: K A = Y x = g yx mod p and K B = X y = g yx mod p Key: K = Y x = X y 21

SSL Handshake Protocol: Master Secret Computation RSA: Server decrypts premaster secret using its private key Diffie Hellman: Both client and server exchange Diffie-Hellman public keys Both perform calculation of premaster secret Both client and server derive master secret from premaster secret and the exchanged random values 22

SSL Handshake Protocol - Details Phase 1: C Client_hello S Client: Creates random number including a time stamp Sends supported Cipher Suites consisting in: Key exchange method Cipher algorithms for data transfer Message digest for creating MAC Sends type of compression (if used) 23

SSL Handshake Protocol - Details Phase 1: C Server_hello S Server: Creates random number Sends selected cipher suite Sends compression method (if used) 24

SSL Handshake Protocol - Details Phase 2: C Authentication Key-Exchange S Server: Sends certificate (except ADH) Sends public key parameters (except DH and RSA) Requests client certificate (optional) Server Hello Done Client: Server s certificate validation 25

SSL Handshake Protocol - Details Phase 3: C Authentication Key-Exchange S Client: Sends certificate (if requested) Creates pre-master secret for key exchange (for RSA). Sends encrypted pre-master secret (for RSA) or public parameters (for EDH and ADH) in key exchange msg Server: Client s certificate validation 26

SSL Handshake Protocol - Details Phase 4:! C Change Cipher Spec! S Client: If DH, EDH, ADH: computes premaster secret Pre-master secret master secret Sends Change Cipher Spec Server: If RSA: decrypts pre-master secret If DH, EDH, ADH: computes premaster secret Pre-master secret master secret Confirms Change Cipher Spec 27

SSL: Change Cipher Spec Protocol Indicates a change in the used ciphers (algorithm, keys etc.). Single message encrypted with current cipher spec sent by client and server. Phase 4 in Handshake protocol. 28

SSL: Record protocol Application data F r a g m e n t a t i o n Packet Packet Packet Compression h Add digital fingerprint Encryption C Add SSL header 29

SSL: Record protocol 1. Fragmentation Division of messages > 2 14 bytes in smaller blocks Or combining multiple higher level protocol data messages into single units 2. Compression With negotiated algorithm (optional) 3. Message authentication code Verification of data coming from TCP level Authentication of messages from higher levels With negotiated algorithm and keys Concatenate message with secret number and sequence number and calculate its hash (TLS uses HMAC algorithm instead) 30

SSL: Record protocol 4. Encryption Information to be encrypted: application data + MAC With negotiated algorithm and exchanged keys Stream ciphers: RC-4 (40 y 128 bits) Block ciphers: IDEA (128 bits) RC-2 (40 bits) DES (40 y 56 bits) Triple DES (168 bits) Fortezza 5. Header Identification of protocol Byte length 31

SSL: Alert Protocol Information about certain events Description Severity Events Error conditions (bad MAC) Certificate expired Illegal parameter Planned connection termination 32

Extended Validation SSL (EV-SSL) New type of X.509 SSL certificates Identification using the certificate policy extension Requires companies to go through a more thorough and complete company validation process in order to establish the legal identity that controls a web site http://cabforum.org/ev_certificate_guidelines_v11.pdf Browsers with EV support display more information for EV certificates than for previous SSL certificates. 33

Extended Validation SSL (EV-SSL) 34

Extended Validation SSL (EV-SSL) 35

Extended Validation SSL (EV-SSL) https://www.phish-no-phish.com/ 36