About scores
- Likely that we need to grade on a curve
- Don’t worry too much about the absolute score: Just
try to study as hard as you can
- Will adjust problem difficulties for the final
This Thursday: No class!
- Enjoy Thanksgiving!
Announcements About scores Likely that we need to grade on a - - PowerPoint PPT Presentation
Announcements About scores Likely that we need to grade on a curve Dont worry too much about the absolute score: Just try to study as hard as you can Will adjust problem difficulties for the final This Thursday: No class!
[lecture slides are adapted from previous slides by Prof. Gene Tsudik]
Most widely deployed security protocol
servers
Current version:
provides
original goals:
numbers)
new merchant
available to all TCP applications
Application TCP IP normal application Application SSL/TLS TCP IP application with SSL
handshake: Alice and Bob use their certificates,
key derivation: Alice and Bob use shared secret to
data transfer: data to be transferred is broken up
connection closure: special messages to securely
considered bad to use same key for more than one
encryption
four keys:
keys derived from key derivation function (KDF)
and creates the keys
why not encrypt data in constant stream as we write it to
until all data processed.
all messages in a session before displaying?
instead, break stream in series of records
issue: in record, receiver needs to distinguish MAC from
length data MAC
problem: attacker can capture and replay or re-order
solution: put sequence number into MAC:
problem: truncation attack:
solution: record types, with special type for closure
MAC = MAC(Mx, sequence||type||data) length type data MAC
encrypted bob.com
how long are fields? which encryption algorithms to use? we may want parameter negotiation
cipher suite
SSL/TLS supports multiple
negotiation: client, server
1.
2.
3.
4.
1.
2.
3.
4.
5.
6.
client typically offers range of algorithms, some
man-in-the middle could delete stronger algorithms
last 2 steps prevent this
why two random nonces? suppose Eve sniffs all messages between Alice &
next day, Eve sets up TCP connection with Bob,
data data fragment data fragment MAC MAC encrypted data and MAC encrypted data and MAC
record header record header
record header: content type; version; length MAC: includes sequence number, computer with MAC key Mx fragment: each SSL fragment 214 bytes (~16 Kbytes)
content type SSL version length MAC data 1 byte 2 bytes 3 bytes
TCP FIN message follows everything thereafter is encrypted
client nonce, server nonce, and pre-master secret input
master secret and new nonces input into another
key block used to derive separate: