Final CS-502 Compress version
Final CS-502 Compress version
Overview
HTTPS: The secure version of HTTP, used to send data between a web
browser and a website.
Importance: HTTPS encrypts data to increase security, essential when
transmitting sensitive data like bank account logins, emails, or health
information.
Key Features
SSL/TLS Handshake
Cookies
Comparisons
HTTP vs. FTP: Both transfer files, but HTTP is simpler, using only one
connection.
HTTP vs. SMTP: Both transfer data between client and server but
differ in message-sending methods.
HTTP Functionality
Components
Business Requirements
Key Components
Port Usage
Port 500: Typically used by IPsec for key exchanges and secure
communications.
IPsec Process
8 , 9, 10 on slides
11
Blowfish
Overview
Blowfish: Symmetric encryption algorithm created by Bruce Schneier
in 1993.
Symmetric Encryption: Uses a single encryption key for both
encryption and decryption.
Block Size: Originally uses a block size of 64 bits.
Successor: Twofish was developed to address Blowfish's limitations,
including a larger block size of 128 bits.
Twofish
File/Disk Encryption
Backup Tools
Email Encryption
RC-4
Overview
Security Concerns
RC-5
Overview
Example
Encryption Example:
o Key: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
o Plain Text: 00000000 00000000
o Cipher Text: EEDBA521 6D8F4B15
Parameters
12
Defines the format, processes, and entities for creating, managing, and
revoking public key digital certificates.
Used for public-key certificates or digital documents.
Associates a cryptographic key pair with a user, organization, website,
or device.
X.509 Certificate
Verifies the ownership of a public key using the X.509 Public Key
Infrastructure (PKI) standard.
Can be used for asymmetric or symmetric encryption.
Contains information about the certificate’s owner and the certificate
itself.
Issued by Certificate Authorities (CAs).
CAs bind verified identities to public keys, ensuring they are genuine
and unmodifiable.
Secure connections, like HTTPS, use the server’s public key and
confirm authenticity with certificates.
Certificates contain details such as the owner, issuer, serial number,
expiration date, and public key.
Digital Signature
13
Authentication Protocols
Types of Authentication
Session Keys
Security Concerns
Replay Attack
Challenge-Response
14
Asymmetric Encryption
Digital Signing:
o For code and certificates.
o Verifies who a public key belongs to by signing with a private
key.
o Used by software developers to sign applications and ensure
code integrity.
Applications:
o Secures communications via Transport Layer Security (TLS).
o Utilized in products like Pretty Good Privacy (PGP).
o Used in VPNs, email services, web browsers, and other
communication channels.
15
Data Integrity
Common Algorithms:
o MD5 (Message-Digest algorithm 5)
o SHA-1 (Secure Hash Algorithm 1)
o RIPEMD-160 (RACE Integrity Primitives Evaluation Message
Digest with a 160-bit digest)
o HMAC (Hash-Based Message Authentication Code)
MD5
SHA-1
Applications of HMAC
16
Email Security