上海交通大学:TLS/SSL Security(PPT课件讲稿)

TLS/SSL Security April 19th 2018 上海式大 I JIAO TONG UNIVERSITY
TLS/SSL Security ▪ April 19th, 2018

目录 Contents a Brief introduction of tls/SS(江子山 〈2>TLs13&TLs1.2(江子山 HVLearn(申丰 4> TLS in Android(Houda Boussaadane 5Q&A 上海通大字 SHANGHAI JIAO TONG UNIVERSITY
目录 Contents 1 A Brief Introduction of TLS/SSL (江子山) 2 TLS1.3 & TLS1.2 (江子山) 3 HVLearn (申丰) 4 TLS in Android (Houda Boussaadane) 5 Q&A

A Brief Introduction of TLS/SSL 上通大字
A Brief Introduction of TLS/SSL

上海大字 httpandhttps oacithub,Inc.(us)htTps://github.com www.qq.com Site Security Site Securi GitHub, Inc. ewww.qq.com Secure Connection Connection is Not Secure You are securely connected to this site, owned by Your connection to this site is not private GitHub, Inc. Information you submit could be viewed by others San Francisco (like passwords, messages, credit cards, etc) California, US Verified by: DigiCert Inc More Information More Information
http and https

上海大字 SHANGH AI JIAO TONG INTVEANTY httpandhttps Nmnl Http Hyper Transfer Protocol超文本传 输协议 It is an application-level protocol for distributed. collaborative, and Http Vs Https hypermedia information systems Https Http Secure超文本传输协议 It is an extension of the Hypertext Transfer protocol for secure communication Encrypted by TLS/SSL Httpoverssl/httpovertls
▪ HTTP ▪ Hyper Transfer Protocol 超文本传 输协议 ▪ It is an application-level protocol for distributed, collaborative, and hypermedia information systems. ▪ HTTPS ▪ HTTP Secure 超文本传输协议 ▪ It is an extension of the Hypertext Transfer Protocol for secure communication. Encrypted by TLS/SSL. ▪ HTTP over SSL / HTTP over TLS http and https

上海大字 SHANGH AI JIAO TONG INTVEANTY Http is not secure Nmnl Http TencentWebsiteWww.qq.com FacultySystemofCseWebsitewww.cs.stu.edu.cn/studentlogin.aspx Https Mail system of SJTU: mail sjtu. edu.cn GitHub Login Website: github. com
▪ HTTP ▪ Tencent Website: www.qq.com ▪ Faculty System of CSE Website : www.cs.sjtu.edu.cn/StudentLogin.aspx ▪ HTTPS ▪ Mail system of SJTU: mail.sjtu.edu.cn ▪ GitHub Login Website: github.com HTTP is not secure

上海大字 SHANGH AI JIAO TONG INTVEANTY This reminds me of Mission Impossible 5n
This reminds me of Mission Impossible 5

上海大字 SHANGH AI JIAO TONG INTVEANTY Brief Introduction of SSL/TLs mn SSL Secure Socket layer The standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral The latest version ssl30 Deprecated because of the vulnerability revealed by google in 2014 POODLE(Padding Oracle On downgraded Legacy Encryption) attack. TLS Transport Layer Security Cryptographic protocols that provide communication security over a computer network The processor of SsL, published by Internet Engineering Task Force (ETF The latest version: TLS13 Draft22
▪ SSL ▪ Secure Socket Layer ▪ The standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. ▪ The latest version: SSL3.0 ▪ Deprecated because of the vulnerability revealed by Google in 2014. ▪ POODLE (Padding Oracle On Downgraded Legacy Encryption) attack. ▪ TLS ▪ Transport Layer Security ▪ Cryptographic protocols that provide communication security over a computer network. ▪ The processor of SSL, published by Internet Engineering Task Force (IETF) ▪ The latest version: TLS1.3 Draft22 Brief Introduction of SSL/TLS

上海大字 SHANGH AI JIAO TONG INTVEANTY History and Development of SSL/TIS nl History c0-0 Nesco IETF TLS 1.2 SSL 2.0SSL 3.0TLS 1.0.1 TLS 1.2" refined 199419961999 2006200820112012 00c0 complete· minor changes MDS-SHA1→SHA256 redesign. no interoperation authenticated encryption with SSL3 e.g. AES in CCM mode can downgrade connections to rotectio ainst cBc-attacks SSL3 implicit I→ explicitⅳ MAC Message Authentication Code MD5 Message Digest Algorithm IETF Internet Engineering Task Force SHA Secure Hash Algorithm CBc Cipher Block Chaining AEs Advanced Encryption Standard Iv Initialization Vector CCM Counter with CBC-MAC Dan Luedtke . Wed Apr IB, 2012.Universty of the Geman Federal /med Foree, Munich e stde 3
History and Development of SSL/TLS

上海大字 SHANGH AI JIAO TONG INTVEANTY Attacks methods Nmnl Privacy The connection is private (or secure) because symmetric cryptography is used to encrypt the data transmitted. The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret negotiated at the start of the session Identification The identity of the communicating parties can be authenticated using public-key cryptography. This authentication can be made optional but is generally required for at least one of the parties( typically the server)
▪ Privacy ▪ The connection is private (or secure) because symmetric cryptography is used to encrypt the data transmitted. The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret negotiated at the start of the session. ▪ Identification ▪ The identity of the communicating parties can be authenticated using public-key cryptography. This authentication can be made optional, but is generally required for at least one of the parties (typically the server). Attacks & Methods
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 香港科技大学:Clustering(PPT讲稿).ppt
- 电子科技大学:《计算机操作系统》课程教学资源(PPT课件讲稿)第三章 处理机的调度和死锁.ppt
- 《图像处理与计算机视觉 Image Processing and Computer Vision》课程教学资源(PPT课件讲稿)Chapter 11 Bundle adjustment Structure reconstruction SFM from N-frames.pptx
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)关联规则 Association Rule.pptx
- 《程序设计基础》课程教学资源:实验教学大纲.pdf
- 白城师范学院:《数据库系统概论 An Introduction to Database System》课程教学资源(PPT课件讲稿)第二章 关系数据库(2.4 关系代数 2.5 关系演算 2.6 小结).ppt
- 安徽工贸职业技术学院:《计算机组装与维护》课程教学资源(PPT课件讲稿)项目五 微型计算机维护.ppt
- 曙光:并行程序设计简介(PPT讲座).ppt
- 《单片机原理与应用》课程教学资源(PPT课件讲稿)第7章 显示与开关/键盘输入及微型打印机接口设计.ppt
- 数据结构与算法(PPT课件讲稿)Data Structures and Algorithms.pptx
- 四川大学:《计算机操作系统 Operating System Principles》课程教学资源(PPT课件讲稿)第5章 死锁.ppt
- 四川大学:《Java面向对象编程》课程PPT教学课件(Object-Oriented Programming - Java)Unit 1.1 Java Applications 1.1.1 Applications in Java(熊运余).ppt
- 厦门大学:《大数据技术原理与应用》课程教学资源(PPT课件讲稿,2016)第8章 流计算.ppt
- Adaptive Dynamic Bipartite Graph Matching:A Reinforcement Learning Approach.pptx
- 中国科学技术大学:《网络安全协议》课程教学资源(PPT课件讲稿)第一章 网络安全综述 Network Security Protocols(薛开平).ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第二章 物理层.ppt
- Excel 2010高级使用技巧(PPT讲稿).ppt
- 《数据库原理》课程教学资源(PPT课件讲稿)第三章 关系数据库标准查询语言SQL.pps
- 河南中医药大学(河南中医学院):《计算机文化》课程教学资源(PPT课件讲稿)第一章 计算机网络概述(主讲:阮晓龙).pptx
- 《软件工程导论》课程教学资源(PPT课件讲稿)第9章 面向对象方法学.ppt
- 山东大学计算机学院:《人机交互技术》课程教学资源(PPT课件讲稿)第7章 Web界面设计.ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第三章 IAP15W4K58S4单片机的硬件结构.ppt
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)面向方面的编程 Aspect Oriented Programming.ppt
- 武昌首义学院:Word的基本操作与技巧(PPT讲稿,主讲:张旋子).pptx
- 《VB程序设计》课程教学资源(PPT课件讲稿)第八章 过程.pps
- 湖南生物机电职业技术学院:《电子商务概论》课程教学资源(PPT课件)第五章 网络信息搜索.ppt
- 《电子商务》课程教学资源(PPT课件讲稿)第十章 网络营销.pptx
- 广西外国语学院:《计算机网络》课程教学资源(PPT课件讲稿)第7章 传输层协议——TCP与UDP.ppt
- 九州大学(日本国立综合大学):烟花算法爆炸因子分析及改良(艺术工学府:余俊).pptx
- 图像视频编码与表达的理论与方法(PPT讲稿)图像压缩标准JPEG.ppt
- 中国科学技术大学:《计算机视觉》课程教学资源(PPT课件讲稿)第九章 单幅图像深度重建 Depthmap Reconstruction Based on Monocular cues.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第六章 应用层.ppt
- 《计算机导论》课程教学资源(PPT课件讲稿)第3章 计算机发展史和计算思维.pptx
- 武昌理工学院(武汉科技大学中南分校):Windows 2000/XP网络组建与系统管理(PPT课件讲稿,主讲:李燕).ppt
- 《网络编程实用教程(第三版)Network Application Programming》课程教学资源(PPT课件讲稿)第1章 概述.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第十章 下一代因特网.ppt
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)对象序列化和持久化 Object Serialization and Persistence.ppt
- B-树、散列技术、散列表的概念、散列函数的构造方法、处理冲突的方法、散列表上的运算.ppt
- 四川大学:《软件测试与维护基础教程》课程教学资源(PPT课件讲稿)软件测试工具 Software Testing Tool.ppt
- 《数字图像处理学》课程教学资源(PPT课件讲稿)第2章 图像、图像系统与视觉系统.pptx