Security Issues

Web Architecture (INFO 290-03)

Erik Wilde, UC Berkeley School of Information
2007-09-11
Creative Commons License

This work is licensed under a CC
Attribution 3.0 Unported License

Abstract

TCP and thus HTTP are clear-text protocols, which make no attempt to hide the data being transmitted. For secure data transfers, it thus is necessary to use additional technologies for providing secure data transfers. This lecture looks briefly into the foundations of cryptographic primitives (such as one-way functions and encryption) and cryptographic protocols. For the Web, the most interesting security feature are secure HTTP interactions, which are provided by HTTP over SSL (HTTPS), a protocol that layers an encryption layer (SSL or TLS) between TCP and HTTP.

Outline (Security 101)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Cryptography

Outline (One-Way Function)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Essence of Data

Reducing Data

Hash

Outline (Secret-Key Cryptography)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Plausible Encryption

Notice the Arrow

Secret-Key Cryptography

Outline (Public-Key Cryptography)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Implausible Encryption

No Arrow Here …

Public-Key Cryptography (Encrypting with Public Key)

And No Arrow Here …

Public-Key Cryptography (Encrypting with Secret Key)

Outline (Cryptographic Protocols)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Building Secure Applications

Outline (Digital Signature)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Encrypted Fingerprints

Creating a Digital Signature

signature-sign.jpg

Verifying a Digital Signature

signature-verify.jpg

Certificate

Outline (Secure Communications)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Encrypted Keys

Outline (HTTP over SSL (HTTPS))

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

HTTP and Security

HTTPS vs. S-HTTP

HTTP and SSL

HTTP and SSL

Transport Layer Security (TLS)

TLS vs. IPsec

TLS vs. IPsec

Outline (Conclusions)

  1. Security 101 [8]
    1. One-Way Function [2]
    2. Secret-Key Cryptography [2]
    3. Public-Key Cryptography [3]
  2. Cryptographic Protocols [6]
    1. Digital Signature [4]
    2. Secure Communications [1]
  3. HTTP over SSL (HTTPS) [5]
  4. Conclusions [1]

Internet Security