Transport Layer Security (TLS) Is The Most Widely Deployed Security Protocol Used
Transport Layer Security (TLS) Is The Most Widely Deployed Security Protocol Used
Transport Layer Security (TLS) is the most widely deployed security protocol used
nowadays, and is used for web browsers and other applications that require data to be
securely exchanged over a network (VOIP, file transfers, VPN connections, instant
messaging, etc.) TLS is used in OPENVPN because TLS/SSL is now one of the
strongest and most mature secure protocols available. It enhances the security of
communications due to the data cypher using the public/private key infrastructure, but
also due to the verification and authentication of data. Most of the crypto capabilities
in OpenVPN are derived from OpenSLL. Regarding the relationship between TLS
and SMTP, they are used for transmitting e-mail messages between servers in a
secure manner. In this way, the message contents are secured during transmission
between the servers. Not many e-mail providers supported TLS in the past, while
situation is different now, and majority of them support it. Additionally, there is
Internet Message Access Protocol (IMAP), which relies on the security properties
provided by TLS. They are used in combination to provide secure message transport.
2. When compared to digital certificates, pre-shared keys are typically used for small
and medium sized businesses that require a VPN connection, but are also easier to
configure. If we use a pre-shared key, then there is no need for public key operations
(depends on the cipher suite) and pre-shared keys fit better in certain cases. For
example, it can be useful in situations with limited CPU power. Additionally, if there
is already a mechanism for setting up shared secret keys by parties, it can be used to
“bootstrap” a key for authenticating a TLS connection. Also, in case where the
connection is usually configured manually in advance, it is much more easier to
configure a pre-shared key than to use certificates. When it comes to security issues,
pre-shared keys are a weak authentication method. If they are used, and unexpected
situation occurs, then all other PC group passwords must be altered since anyone can
get the group password from the stolen PC. The security of a pre-shared key
deployment can be improved by encrypting the key with a personal identification
number (PIN).
5. Perfect forward secrecy states that something that is encrypted and secret should
remain that way. However, even if the information is secret now, it does not mean
that it will be secret at some point in the future. Secure web communication is based
on SSL/TLS, and on the mixture of private and public key asymmetric cryptography
and symmetric key encryption. PFS can also be defined as an attribute of the specific
key exchange mechanisms in TLS security.
This implies the independence of the session key, which is generated during the
secure session. The main goal of key exchange is to ensure that two parties will agree
on a session key. This happens upon the security setting available for both
participants of the negotiation, and no one except them will know it. It is important to
note that only a certain cipher suites may be used. Meaning that the connection
negotiation includes exchange of information about which cipher suites the client can
support. After that, the server selects a preferred scheme to be used for the session.
The server may also decline all offered cipher suites. Therefore, in order to use and
implement PFS it is necessary to make suitable cipher suites available on the server.
A certain server can select to use PFS cipher suite during the connection negotiation.
This way PFS protects the session from future decryption. It happens in a way that
other party gains knowledge of the server's private key. To PFS in terms of cipher
suite the most important thing is a key exchange, and it is the main element of the
connection negotiation that provides secure session. PFS-compliant key exchange
mechanisms that are available include:
However, there are certain drawbacks, which state that due to the server
administrator’s unawareness PFS can easily be broken. It is important to note that it is
not enough to enable the support of the cipher suites with certain FS key exchange
mechanisms on the server, but also to prioritize them.
PFS can also be used in terms of key exchange. It follows certain steps:
1. Server sends its certificate,
2. Then the client picks a random session key,
3. After that the client encrypts it with the server’s public key which is obtained
from the certificate
4. Then the server sends it back to the server
The created session is known as a secure session. In this type of session, a key can
only be decrypted with the server’s private key that corresponds to the public key.
This way, the server sets up thousands of sessions using the same key pair. It creates a
link between the session key, which is unique for each session and long-term key.
Although, if somehow private key is compromised, an adversary is able to go back in
time and decrypt all the previously recorded traffic encrypted using the same long-
term key.