Академический Документы
Профессиональный Документы
Культура Документы
Application Application
SSL SSL
TCP TCP
Router
IP
IP
Client Server
Link Internet Link
layer Router layer
Physical Physical
layer Router layer
NFS
XDR
TCP UDP
IP
Handshake
Alert CCS
Record
TCP
• Data segmentation
• Data compression (if available)
• Generation of digest (HMAC) to ensure integrity
• Data encryption to ensure confidentiality
• Preliminary phase:
– Identification of the two parties
– Negotiation of the cryptographic attributes
– Generation and sharing of keys
• Establishment of an SSL Session
– an association of the two entities with a common set of
parameters and cryptographic attributes
– cannot last more than 24 hours
• An SSL Connection uses the principal cryptographic
parameters of a session and reinitializes the encryption
ServerHello Certificate
ServerKeyExchange
Certificate
ClientKeyExchange
CertificateVerify
ChangeCipherSpec
Finished
Optional message
ServerHello
ChangeCipherSpec
Client Server
Finished
ApplicationData
ChangeCipherSpec
Finished
ApplicationData
Not Mathematical
encrypted Operations
Encrypted
* 4-octet time stamp +
28-octets random
• MasterSecret
MasterSecret number
– is a 48-octet secret (Per Session)
shared between the two
sides and used to
generate all other secrets
Hashing key Encryption key
– calculated at the start of
a session from
PreMasterSecret
exchanged during the
initial handshake
© M. H. Sherif Protocols for Secure Electronic Commerce (2nd ed.)
Calculation of the Session
Cryptographic Parameters
• Once PreMasterSecret has been exchanged, both the
client and server compute MasterSecret
• From MasterSecret, each side calculates
– the encryption keys
– the key for hashing with HMAC
– the initialization vectors
• Finished message
– Includes a hash of all the handshake messages with the
cryptographic attributes just negotiated to prevent any
man-in-the middle attack.
• Severity of Messages
• Fatal means immediate termination
• Bad_record_mac
• Decompression_failure