Question

In: Computer Science

Websites and online applications need to be secured as they are exposed to the world. What...

Websites and online applications need to be secured as they are exposed to the world. What role
does the TLS and SSL handshake process play when initiated by a web client accessing a
secure website? Explain how public key encryption works. Explain how encryption methods are
evaluated using a CIA triad. (20 Mark

Solutions

Expert Solution

What Is an SSL/TLS Handshake?

An SSL/TLS handshake is a negotiation between two parties on a network – such as a browser and web server – to establish the details of their connection. It determines what version of SSL/TLS will be used in the session, which cipher suite will encrypt communication, verifies the server (and sometimes also the client), and establishes that a secure connection is in place before transferring data.

what is ssl certificate

SSL stands for Secure Sockets Layer and, in short, it's the standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details. The two systems can be a server and a client (for example, a shopping website and browser) or server to server (for example, an application with personal identifiable information or with payroll information).

It does this by making sure that any data transferred between users and sites, or between two systems remain impossible to read. It uses encryption algorithms to scramble data in transit, preventing hackers from reading it as it is sent over the connection. This information could be anything sensitive or personal which can include credit card numbers and other financial information, names and addresses.

TLS (Transport Layer Security) is just an updated, more secure, version of SSL. We still refer to our security certificates as SSL because it is a more commonly used term, but when you are buying SSL from DigiCert you are actually buying the most up to date TLS certificates with the option of ECC, RSA or DSA encryption.

TLS is an encryption protocol designed to secure Internet communications. A TLS handshake is the process that kicks off a communication session that uses TLS encryption. During a TLS handshake, the two communicating sides exchange messages to acknowledge each other, verify each other, establish the encryption algorithms they will use, and agree on session keys. TLS handshakes are a foundational part of how HTTPS works.

When does a TLS handshake occur?

A TLS handshake takes place whenever a user navigates to a website over HTTPS and the browser first begins to query the website's origin server. A TLS handshake also happens whenever any other communications use HTTPS, including API calls and DNS over HTTPS queries.

TLS handshakes occur after a TCP connection has been opened via a TCP handshake.

​​​​​​ TLS handshake

WORKING OF PUBLIC KEY ENCRYPTION

What is public key encryption?

Public key encryption, or public key cryptography, is a method of encrypting data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key, and data encrypted with the private key can only be decrypted with the public key. Public key encryption is also known as asymmetric encryption. It is widely used, especially for TLS/SSL, which makes HTTPS possible.

Public key cryptography can seem complex for the uninitiated; fortunately a writer named Panayotis Vryonis came up with an analogy that roughly goes as follows.

Imagine a trunk with a lock that two people, Bob and Alice, use to ship documents back and forth. A typical lock has only two states: locked and unlocked. Anyone with a copy of the key can unlock the trunk if it's locked, and vice versa. When Bob locks the trunk and sends it to Alice, he knows that Alice can use her copy of the key to unlock the trunk. This is essentially how what's known as symmetric cryptography works: one secret key is used for both encrypting and decrypting, and both sides of a conversation use the same key.

Now imagine, instead, that Bob makes a trunk with a special kind of lock. This lock has three states instead of two:

  • A. Locked, key turned all the way to the left
  • B. Unlocked, in the middle.
  • C. Locked, key turned all the way to the right.

Instead of one key, two keys go with this lock:

  • Key No. 1 can only turn to the left
  • Key No. 2 can only turn to the right

This means that if the trunk is locked and the key is turned to position A, only key No. 2 can unlock it by turning right, to position B (unlocked). If the trunk is locked in position C, only key No. 1 can unlock it by turning the lock left, to position B.

In other words, either key can lock the trunk – but once it is locked, only the other key can unlock it.

Now let's say Bob makes a few dozen copies of key No. 2, the key that only turns right, and shares them with everyone he knows and anyone who wants a copy, making it his public key. He keeps key No. 1 for himself – it's his private key. What does this accomplish?

  1. Alice can send Bob confidential data via the trunk and be confident that only Bob can unlock it. Once Alice has locked the trunk with the public key, which turns from left to right, only a key that can turn right to left can unlock it. That means only Bob's private key can unlock it.
  2. Alice can be sure that the trunk is actually from Bob, and not an impersonator, if it's locked with his private key. There's only one key that can lock the trunk so that the lock is in position A, or turned all the way to the left: Bob's private key. True, anyone can unlock it with the public key by turning the key to the right, but it's guaranteed that the trunk is from Bob.

Substitute plaintext data for the trunk and cryptographic keys for the physical keys from this analogy, and this is how public key cryptography works. Only the owner of the private key can encrypt data so that the public key decrypts it; meanwhile, anyone can encrypt data with the public key, but only the owner of the private key can decrypt it.

Therefore, anyone can send data securely to the private key owner. Also, anyone can verify that data they receive from the owner of the private key is actually from that source, and not from an impersonator

Explain how encryption methods are
evaluated using a CIA triad

The CIA principle

A simple but widely-applicable security model is the CIA triad; standing for Confidentiality, Integrity and Availability; three key principles which should be guaranteed in any kind of secure system. This principle is applicable across the whole subject of Security Analysis, from access to a user's internet history to security of encrypted data across the internet. If any one of the three can be breached it can have serious consequences for the parties concerned.

Confidentiality

Confidentiality is the ability to hide information from those people unauthorised to view it. It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked most often. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data trasferred from one computer to another.

Integrity

The ability to ensure that data is an accurate and unchanged representation of the original secure information. One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver.

Availability

It is important to ensure that the information concerned is readily accessible to the authorised viewer at all times. Some types of security attack attempt to deny access to the appropriate user, either for the sake of inconveniencing them, or because there is some secondary effect. For example, by breaking the web site for a particular search engine, a rival may become more popular.


Related Solutions

Before addressing the following questions, you will first need to collect some data! Use online websites...
Before addressing the following questions, you will first need to collect some data! Use online websites (such as Wikipedia) to find economic data for Japan, USA, India, Italy, Iraq, and Mexico. Specifically, find recent data for per capita GDP and government debt-to-GDP ratio. Based on the data collected, do you think that debt is a problem faced by economically advanced countries, undeveloped countries, or both? Justify your answer. The United States government has a 100% repayment rate—it has always repaid...
Before addressing the following questions, you will first need to collect some data! Use online websites...
Before addressing the following questions, you will first need to collect some data! Use online websites (such as Wikipedia) to find economic data for Japan, USA, India, Italy, Iraq, and Mexico. Specifically, find recent data for per capita GDP and government debt-to-GDP ratio. Based on the data collected, do you think that debt is a problem faced by economically advanced countries, undeveloped countries, or both? Justify your answer. The United States government has a 100% repayment rate—it has always repaid...
What real world applications exist for Euler Circuits?
What real world applications exist for Euler Circuits?
The popularity of online auction websites has risen dramatically as many shoppers choose to shop online...
The popularity of online auction websites has risen dramatically as many shoppers choose to shop online instead of at retail stores. The data provided describe the sale prices of the video game Mario Kart Wii on one such online auction site during the month of October in 2009.The variables included in this data set are: the duration of the auction in days, the number of bids placed on the Mario Kart game, whether or not the auction's picture used a...
The numbers of online applications from simple random samples of college applications for 2003 and for...
The numbers of online applications from simple random samples of college applications for 2003 and for the 2009 were taken. In 2003, out of 312 applications, 97 of them were completed online. In 2009, out of 316 applications, 78 of them were completed online. Test the claim that the proportion of online applications in 2009 was equal to than the proportion of online applications in 2003 at the .10 significance level. Claim: Select an answer u 1 ≤ u 2...
What role does new technology play in creating new applications? Cite real world applications.
What role does new technology play in creating new applications? Cite real world applications.
Review in your textbook, online resources such as websites, and journals the information on all the...
Review in your textbook, online resources such as websites, and journals the information on all the Monthly and Yearly Examinations. Your Discussion Posting must be cited. Discuss the types of monthly and yearly examinations that need to be assessed on males and females. In your discussion, describe why these exams need to be performed. Include in your discussion what factors influence how soon, and when these tests need to be performed?
Online shoppers have high expectations. Shoppers expect more from online shopping than easy-to-use websites. Successful online...
Online shoppers have high expectations. Shoppers expect more from online shopping than easy-to-use websites. Successful online retailers are creating online shopping experiences that encourage repeat customers and reward shopper loyalty. In 2013, UPS (United Parcel Service, Inc., Sandy Springs, GA) conducted a series of studies to gain insight about the shopping behavior of customers. The studies found that customers want to be able to shop anywhere at any time, and they want other services such as the flexibility to choose...
Using Ethical Egoism as your framework, what do you say about the hate speech online websites?
Using Ethical Egoism as your framework, what do you say about the hate speech online websites?
real-world applications of calibration of pressure gauge  
real-world applications of calibration of pressure gauge  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT