CSCI-UA.9480 Introduction to Computer Security
Session 1.4
Transport Layer Security
- Prof. Nadim Kobeissi
CSCI-UA.9480 Introduction to Computer Security Session 1.4 - - PowerPoint PPT Presentation
CSCI-UA.9480 Introduction to Computer Security Session 1.4 Transport Layer Security Prof. Nadim Kobeissi 1.4a HTTPS and TLS 2 CSCI-UA.9480: Introduction to Computer Security Nadim Kobeissi What is TLS? The S in HTTP S . Most likely
CSCI-UA.9480 Introduction to Computer Security
Session 1.4
Transport Layer Security
HTTPS and TLS
2 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiWhat is TLS?
HTTPS Pages by Country (Chrome)
4 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: https://transparencyreport.google.com/https/HTTPS Pages by Platform (Chrome)
5 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: https://transparencyreport.google.com/https/HTTPS Pages by Google Service
6 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: https://transparencyreport.google.com/https/HTTPS Pages by Country (Firefox)
7 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: https://letsencrypt.org/stats/SSL 1.0 was never released due to critical security flaws. SSL 2.0 barely lasted one year before being replaced.
8 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiDid you know?
History of TLS
As discussed last time: protocols.
In protocols, we reason about:Protocols need to do things.
Protocols are frequently entrusted with:Protocols need to do things.
Protocols have building blocks:TLS is a secure channel protocol.
TLS is a secure channel protocol.
Cipher suites?
Evaluating HTTPS overall security.
16 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiNYU.edu: Supported protocols.
17 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiNYU.edu: Supported cipher suites.
18 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiNYU.edu: Supported devices.
19 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiTLS 1.2 and TLS 1.3: How Protocols Evolve
20 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi TLS 1.2 TLS 1.3TLS 1.2 and TLS 1.3: How Protocols Evolve
21 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Supported protocol and cipher suites Authenticated Key Exchange Verify handshake log Application data stage 0 Round Trip Messaging! (0-RTT) TLS 1.2 TLS 1.3TLS 1.3: A Simpler Overview
Public Key Infrastructure
23 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiWhy do certificates matter?
Why do certificates matter?
Certificate Authorities: a complete mess.
Certificate authorities are a scam that benefits nobody.Certificate Authorities: a complete mess.
27 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiLet’s Encrypt: a new hope?
Let’s Encrypt Growth
29 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: https://letsencrypt.org/stats/Certificate Authority Market Share
30 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: https://w3techs.com/technologies/history_overview/ssl_certificateAttacks on TLS
31 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiAttacks on TLS: SMACK and FREAK
Attacks on TLS: Sloth
“SLOTH is also a not-so-subtle reference to laziness in the protocol design community with regard to removing legacy cryptographic constructions.” – SLOTH paper authors.
34 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiNext time: Usability and Secure Messaging.
35 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi