Transport Layer Security-TLS传输安全加密.pdf

Transport Layer Security-TLS传输安全加密.pdf

  1. 1、本文档共66页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多

TransportLayerSecurity

Chester Rebeiro

IIT Madras

Some of the slides borrowed from the book ‘Computer Security: A Hands on Approach’ by

Wenliang Du

TLS:Protocoltoachievesecure

communication

TLS provides secure communication channel with 3 properties:

• Confidentiality

• Integrity

• Authentication

Two important components

• TLS Handshake

• Secure Data transmission

2

SSLvsTLS

• 1995: Netscape released SSL 2.0

• 1996: New version SSL 3.0

• 1999: TLS introduced as the new version of SSL

• 2011: SSL 2.0 deprecated by IETF

• 2015: SSL 3.0 deprecated by IETF

** Difference: Handshake protocols changes from SSL to TLS.

Encryption

3

TLSintheNetworkStack

• Between the network and Application

layer.

• Unprotected data is given to TLS by Application

layer

• TLS handles encryption, decryption and integrity

checks

• TLS gives protected data to Transport layer

4

TLSHandshake

• Before a client and server can communicate securely, several things

need to be set up first:

• Encryption algorithm and key

• MAC algorithm

• Algorithm for key exchange

• These cryptographic parameters need to be agreed upon by the client

and server

TLSHandshake

6

NetworkTrafficsDuringTLSHandshake

Since TLS runs top of TCP, a TCP connection needs to be established

befor

文档评论(0)

176****9524 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档