SlideShare a Scribd company logo
1 of 23
Download to read offline
Chapter 9:Chapter 9:Chapter 9:Chapter 9:----
Web SecurityWeb SecurityWeb SecurityWeb Security
By:- Sarthak Patel (www.sarthakpatel.in)
Outline
Web Security Requirement
SSLAndTransport Layer Security
Secure ElectronicTransactions (SET)
Firewall Design Principles
Sarthak Patel (sarthakpatel.in)2
Trusted Systems
Web Security
Web now widely used by business, government, individuals
but Internet &Web are vulnerable
have a variety of threats
integrity
confidentiality
Sarthak Patel (sarthakpatel.in)3
confidentiality
denial of service
authentication
need added security mechanisms
SSL (Secure Socket Layer)
transport layer security service
originally developed by Netscape
version 3 designed with public input
subsequently became Internet standard known asTLS
(Transport Layer Security)
Sarthak Patel (sarthakpatel.in)4
(Transport Layer Security)
usesTCP to provide a reliable end-to-end service
SSL has two layers of protocols
SSL Architecture
Sarthak Patel (sarthakpatel.in)5
SSL Architecture
SSL connection
a transient, peer-to-peer, communications link
associated with 1 SSL session
SSL session
an association between client & server
Sarthak Patel (sarthakpatel.in)6
an association between client & server
created by the Handshake Protocol
define a set of cryptographic parameters
may be shared by multiple SSL connections
SSL Record Protocol Services
message integrity
using a MAC with shared secret key
confidentiality
using symmetric encryption with a shared secret key defined by
Handshake Protocol
Sarthak Patel (sarthakpatel.in)7
Handshake Protocol
AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40,
RC4-128
message is compressed before encryption
SSL Record Protocol Operation
Sarthak Patel (sarthakpatel.in)8
SSL Change Cipher Spec Protocol
one of 3 SSL specific protocols which use the SSL Record
protocol
a single message
causes pending state to become current
hence updating the cipher suite in use
Sarthak Patel (sarthakpatel.in)9
hence updating the cipher suite in use
SSL Alert Protocol
conveys SSL-related alerts to peer entity
severity
warning or fatal
specific alert
fatal: unexpected message, bad record mac, decompression failure,
Sarthak Patel (sarthakpatel.in)10
fatal: unexpected message, bad record mac, decompression failure,
handshake failure, illegal parameter
warning: close notify, no certificate, bad certificate, unsupported
certificate, certificate revoked, certificate expired, certificate unknown
compressed & encrypted like all SSL data
SSL Handshake Protocol
allows server & client to:
authenticate each other
to negotiate encryption & MAC algorithms
to negotiate cryptographic keys to be used
comprises a series of messages in phases
Sarthak Patel (sarthakpatel.in)11
comprises a series of messages in phases
1. Establish Security Capabilities
2. ServerAuthentication and Key Exchange
3. ClientAuthentication and Key Exchange
4. Finish
SSL Handshake Protocol
Sarthak Patel (sarthakpatel.in)12
TLS (Transport Layer Security)
IETF standard RFC 2246 similar to SSLv3
with minor differences
in record format version number
uses HMAC for MAC
a pseudo-random function expands secrets
Sarthak Patel (sarthakpatel.in)13
has additional alert codes
some changes in supported ciphers
changes in certificate types & negotiations
changes in crypto computations & padding
Secure Electronic Transactions
(SET)
open encryption & security specification
to protect Internet credit card transactions
developed in 1996 by Mastercard,Visa etc
not a payment system
rather a set of security protocols & formats
Sarthak Patel (sarthakpatel.in)14
rather a set of security protocols & formats
secure communications amongst parties
trust from use of X.509v3 certificates
privacy by restricted info to those who need it
SET Components
Sarthak Patel (sarthakpatel.in)15
SET Transaction
1. customer opens account
2. customer receives a certificate
3. merchants have their own certificates
4. customer places an order
5. merchant is verified
Sarthak Patel (sarthakpatel.in)16
5. merchant is verified
6. order and payment are sent
7. merchant requests payment authorization
8. merchant confirms order
9. merchant provides goods or service
10. merchant requests payment
Dual Signature
customer creates dual messages
order information (OI) for merchant
payment information (PI) for bank
neither party needs details of other
but must know they are linked
Sarthak Patel (sarthakpatel.in)17
but must know they are linked
use a dual signature for this
signed concatenated hashes of OI & PI
DS=E(PRc, [H(H(PI)||H(OI))])
SET Purchase Request
SET purchase request exchange consists of
four messages
1. Initiate Request - get certificates
2. Initiate Response - signed response
3. Purchase Request - of OI & PI
Sarthak Patel (sarthakpatel.in)18
3. Purchase Request - of OI & PI
4. Purchase Response - ack order
Purchase Request – Customer
Sarthak Patel (sarthakpatel.in)19
Purchase Request – Merchant
1. verifies cardholder certificates using CA sigs
2. verifies dual signature using customer's public
signature key to ensure order has not been tampered
with in transit & that it was signed using cardholder's
private signature key
Sarthak Patel (sarthakpatel.in)20
private signature key
3. processes order and forwards the payment information
to the payment gateway for authorization (described
later)
4. sends a purchase response to cardholder
Purchase Request – Merchant
Sarthak Patel (sarthakpatel.in)21
Payment Gateway Authorization
1. verifies all certificates
2. decrypts digital envelope of authorization block to obtain
symmetric key & then decrypts authorization block
3. verifies merchant's signature on authorization block
4. decrypts digital envelope of payment block to obtain symmetric
key & then decrypts payment block
Sarthak Patel (sarthakpatel.in)22
key & then decrypts payment block
5. verifies dual signature on payment block
6. verifies that transaction ID received from merchant matches that
in PI received (indirectly) from customer
7. requests & receives an authorization from issuer
8. sends authorization response back to merchant
Payment Capture
merchant sends payment gateway a payment capture request
gateway checks request
then causes funds to be transferred to merchants account
notifies merchant using capture response
Sarthak Patel (sarthakpatel.in)23

More Related Content

What's hot

SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksAltoros
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Microsoft Décideurs IT
 
Hyperledger whitepaper
Hyperledger whitepaperHyperledger whitepaper
Hyperledger whitepapermustafa sarac
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalScott Strang
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanScott Strang
 
Technical Introduction to Hyperledger Fabric v1.0
Technical Introduction to Hyperledger Fabric v1.0Technical Introduction to Hyperledger Fabric v1.0
Technical Introduction to Hyperledger Fabric v1.0Altoros
 
Trusto Artificial Intelligence Blockchain platform 2018
Trusto Artificial Intelligence Blockchain  platform 2018 Trusto Artificial Intelligence Blockchain  platform 2018
Trusto Artificial Intelligence Blockchain platform 2018 Aurel Ispas
 
Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013Crishantha Nanayakkara
 

What's hot (10)

SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Act2000n
Act2000nAct2000n
Act2000n
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
 
Hyperledger whitepaper
Hyperledger whitepaperHyperledger whitepaper
Hyperledger whitepaper
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet Suman
 
Technical Introduction to Hyperledger Fabric v1.0
Technical Introduction to Hyperledger Fabric v1.0Technical Introduction to Hyperledger Fabric v1.0
Technical Introduction to Hyperledger Fabric v1.0
 
Trusto Artificial Intelligence Blockchain platform 2018
Trusto Artificial Intelligence Blockchain  platform 2018 Trusto Artificial Intelligence Blockchain  platform 2018
Trusto Artificial Intelligence Blockchain platform 2018
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013
 

Viewers also liked

H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老Tony Chen
 
Me visto, expreso y aprendo
Me visto, expreso y aprendoMe visto, expreso y aprendo
Me visto, expreso y aprendodec-admin
 
174.viva la familia
174.viva la familia174.viva la familia
174.viva la familiadec-admin
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textosMelanie Rico
 
296.tu participacion cuenta
296.tu participacion cuenta296.tu participacion cuenta
296.tu participacion cuentadec-admin
 
174. los infiltrados
174. los infiltrados174. los infiltrados
174. los infiltradosdec-admin
 
Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学junkonishimoto
 
164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta164. juntos podemos llegar a la meta
164. juntos podemos llegar a la metadec-admin
 
351.creando el área de juego
351.creando el área de juego351.creando el área de juego
351.creando el área de juegodec-admin
 
Folder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLPFolder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLPTeamInBalance
 
Fomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia socialFomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia socialdec-admin
 

Viewers also liked (20)

H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老
 
Unidad 3 sección 2
Unidad 3 sección 2Unidad 3 sección 2
Unidad 3 sección 2
 
Me visto, expreso y aprendo
Me visto, expreso y aprendoMe visto, expreso y aprendo
Me visto, expreso y aprendo
 
Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
174.viva la familia
174.viva la familia174.viva la familia
174.viva la familia
 
96 mate2a
96 mate2a96 mate2a
96 mate2a
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textos
 
296.tu participacion cuenta
296.tu participacion cuenta296.tu participacion cuenta
296.tu participacion cuenta
 
174. los infiltrados
174. los infiltrados174. los infiltrados
174. los infiltrados
 
84. lectura
84. lectura84. lectura
84. lectura
 
Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学
 
164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta
 
351.creando el área de juego
351.creando el área de juego351.creando el área de juego
351.creando el área de juego
 
FC Day2012
FC Day2012FC Day2012
FC Day2012
 
Sección 2. unidad 8 corregida1
Sección 2. unidad 8 corregida1Sección 2. unidad 8 corregida1
Sección 2. unidad 8 corregida1
 
Folder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLPFolder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLP
 
Election management software gujrat
Election management software gujratElection management software gujrat
Election management software gujrat
 
Fomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia socialFomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia social
 
Chocolate Box
Chocolate BoxChocolate Box
Chocolate Box
 
Sección 5. infracciones de la vida silvestre
Sección 5. infracciones de la vida silvestreSección 5. infracciones de la vida silvestre
Sección 5. infracciones de la vida silvestre
 

Similar to IS Unit 9_Web Security

1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptxMARIA401634
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network SecuritySarthak Patel
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecuritySarthak Patel
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7koolkampus
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET Journal
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxssuser865ecd
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerAkhil Nadh PC
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.pptSonukumarRawat
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch PresentationRam Dutt Shukla
 

Similar to IS Unit 9_Web Security (20)

ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
Ch17
Ch17Ch17
Ch17
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptx
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Web Security
Web SecurityWeb Security
Web Security
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Unit -- 5.ppt
Unit -- 5.pptUnit -- 5.ppt
Unit -- 5.ppt
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 

Recently uploaded

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

IS Unit 9_Web Security

  • 1. Chapter 9:Chapter 9:Chapter 9:Chapter 9:---- Web SecurityWeb SecurityWeb SecurityWeb Security By:- Sarthak Patel (www.sarthakpatel.in)
  • 2. Outline Web Security Requirement SSLAndTransport Layer Security Secure ElectronicTransactions (SET) Firewall Design Principles Sarthak Patel (sarthakpatel.in)2 Trusted Systems
  • 3. Web Security Web now widely used by business, government, individuals but Internet &Web are vulnerable have a variety of threats integrity confidentiality Sarthak Patel (sarthakpatel.in)3 confidentiality denial of service authentication need added security mechanisms
  • 4. SSL (Secure Socket Layer) transport layer security service originally developed by Netscape version 3 designed with public input subsequently became Internet standard known asTLS (Transport Layer Security) Sarthak Patel (sarthakpatel.in)4 (Transport Layer Security) usesTCP to provide a reliable end-to-end service SSL has two layers of protocols
  • 5. SSL Architecture Sarthak Patel (sarthakpatel.in)5
  • 6. SSL Architecture SSL connection a transient, peer-to-peer, communications link associated with 1 SSL session SSL session an association between client & server Sarthak Patel (sarthakpatel.in)6 an association between client & server created by the Handshake Protocol define a set of cryptographic parameters may be shared by multiple SSL connections
  • 7. SSL Record Protocol Services message integrity using a MAC with shared secret key confidentiality using symmetric encryption with a shared secret key defined by Handshake Protocol Sarthak Patel (sarthakpatel.in)7 Handshake Protocol AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128 message is compressed before encryption
  • 8. SSL Record Protocol Operation Sarthak Patel (sarthakpatel.in)8
  • 9. SSL Change Cipher Spec Protocol one of 3 SSL specific protocols which use the SSL Record protocol a single message causes pending state to become current hence updating the cipher suite in use Sarthak Patel (sarthakpatel.in)9 hence updating the cipher suite in use
  • 10. SSL Alert Protocol conveys SSL-related alerts to peer entity severity warning or fatal specific alert fatal: unexpected message, bad record mac, decompression failure, Sarthak Patel (sarthakpatel.in)10 fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown compressed & encrypted like all SSL data
  • 11. SSL Handshake Protocol allows server & client to: authenticate each other to negotiate encryption & MAC algorithms to negotiate cryptographic keys to be used comprises a series of messages in phases Sarthak Patel (sarthakpatel.in)11 comprises a series of messages in phases 1. Establish Security Capabilities 2. ServerAuthentication and Key Exchange 3. ClientAuthentication and Key Exchange 4. Finish
  • 12. SSL Handshake Protocol Sarthak Patel (sarthakpatel.in)12
  • 13. TLS (Transport Layer Security) IETF standard RFC 2246 similar to SSLv3 with minor differences in record format version number uses HMAC for MAC a pseudo-random function expands secrets Sarthak Patel (sarthakpatel.in)13 has additional alert codes some changes in supported ciphers changes in certificate types & negotiations changes in crypto computations & padding
  • 14. Secure Electronic Transactions (SET) open encryption & security specification to protect Internet credit card transactions developed in 1996 by Mastercard,Visa etc not a payment system rather a set of security protocols & formats Sarthak Patel (sarthakpatel.in)14 rather a set of security protocols & formats secure communications amongst parties trust from use of X.509v3 certificates privacy by restricted info to those who need it
  • 15. SET Components Sarthak Patel (sarthakpatel.in)15
  • 16. SET Transaction 1. customer opens account 2. customer receives a certificate 3. merchants have their own certificates 4. customer places an order 5. merchant is verified Sarthak Patel (sarthakpatel.in)16 5. merchant is verified 6. order and payment are sent 7. merchant requests payment authorization 8. merchant confirms order 9. merchant provides goods or service 10. merchant requests payment
  • 17. Dual Signature customer creates dual messages order information (OI) for merchant payment information (PI) for bank neither party needs details of other but must know they are linked Sarthak Patel (sarthakpatel.in)17 but must know they are linked use a dual signature for this signed concatenated hashes of OI & PI DS=E(PRc, [H(H(PI)||H(OI))])
  • 18. SET Purchase Request SET purchase request exchange consists of four messages 1. Initiate Request - get certificates 2. Initiate Response - signed response 3. Purchase Request - of OI & PI Sarthak Patel (sarthakpatel.in)18 3. Purchase Request - of OI & PI 4. Purchase Response - ack order
  • 19. Purchase Request – Customer Sarthak Patel (sarthakpatel.in)19
  • 20. Purchase Request – Merchant 1. verifies cardholder certificates using CA sigs 2. verifies dual signature using customer's public signature key to ensure order has not been tampered with in transit & that it was signed using cardholder's private signature key Sarthak Patel (sarthakpatel.in)20 private signature key 3. processes order and forwards the payment information to the payment gateway for authorization (described later) 4. sends a purchase response to cardholder
  • 21. Purchase Request – Merchant Sarthak Patel (sarthakpatel.in)21
  • 22. Payment Gateway Authorization 1. verifies all certificates 2. decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3. verifies merchant's signature on authorization block 4. decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block Sarthak Patel (sarthakpatel.in)22 key & then decrypts payment block 5. verifies dual signature on payment block 6. verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7. requests & receives an authorization from issuer 8. sends authorization response back to merchant
  • 23. Payment Capture merchant sends payment gateway a payment capture request gateway checks request then causes funds to be transferred to merchants account notifies merchant using capture response Sarthak Patel (sarthakpatel.in)23