The transport layer security protocol (TLS) Flashcards

1
Q

What is TLS?

A

Cryptographic services protocol based on PKI

Runs primarly over TCP

Consist of 3 higher-level protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is TLS often used for?

A

To allow browsers to establish secure sessions with web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 3 higher level protocols does TCP consist of?

A

TLS handshake protocol to set up session

TLS alert protocol to signal events such as failures

TLS change cipher spec protocol to change the cryptographic algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the layers of the TLS: Protocol stack?

A

Handshake - Change cipher spec - alert - http or other

TLS record protocol

TCP

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the TLS alert protocol do?

A

Handles connections by sending an “alert” message of various degrees of severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of alerts in the alert protocol?

A

Warning alerts

close_notify alert

fatal alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can happen if we have improper handling of alert messages?

A

Truncation attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the change cipher spec protocol do?

A

Normally used after handshake to indicate commencement of secure traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does TLS ciphersuites do?

A

Specify the public key algorithms used in handshake, and symmetric algo used in record protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite

A

Key exchange uses RSA to encrypt a secret chosen by the client

Triple DES (enc-dec-enc) in CBC mode used for encryption

SHA-1 used for the HMAC for data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the record protocol do in TLS?

A

Provides 2 services:
Message confidentiality: Ensure message content cannot be read in transit

Message integrity:Ensure receiver can detect if a message is modified in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the record protocol provide the 2 services?

A

A symmetric encryption algorithm and a MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the record protocol format

A

Header: Content type, major version, minor version, length

Plaintext (optionally compressed): encrypted

MAC (not a separate field if AEAD is used): encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Content Type field in the record protocol header?

A

Defines content types. The defined ones are:
- change-cipher-spec
- alert
- handshake
- application data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the length field in the record protocol header?

A

Length in octets of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the operations of the record protocol?

A

Fragmentation

Compression: optionally applied

Authenticated data

Plaintext: Compressed data and the MAC, if present

Session keys for MAC and encryption algorithms are established during handshake protocols

Encryption and MAC algorithms are specified in the negotiated ciphersuite

17
Q

What is fragmentation in the record protocol?

A

Each application layer message is fragmented into blocks of 2^14 bytes or less

18
Q

What is authenticated data in the record protocol?

A

Consist of the (compressed) data, header, and an implicit record sequence number

19
Q

What crypto algorithms are used in the record protocol?

A

MAC: HMAC, SHA-2 allowed in TLS 1.2

Enc: Either a block in CBC, or stream cipher

AEAD: Allowed instead of enc and MAC in TLS 1.2

20
Q

What is the purpose of the handshake protocol?

A

Negotiates the TLS version and crypto algos to be used

Establishes shared session key for use in record protocol

Auths server

Auths client (optional)

Completes session establishment

21
Q
A