SSL/TLS-Secure Connection
Whenever we browse the internet, we see some site
URLs, there is a padlock present and in some, it is absent. The presence of
this padlock symbolizes secure communication between the user and the server.
This padlock consists of a secure communication certificate and that
certificate communication is called SSL Certificate communication i.e., Secure
Socket Layer. SSL's function is to build a secure chain of trust between the
user and the server. The certificate is provided by a Certificate Authority
(CAs) like Let’s Encrypt, Bypass, Comodo, GeoTrust et cetera, which actually
builds the chain of trust running the certificate validation in a hierarchical
manner.
Most
modern web browsers have flagged sites without SSL/TLS as insecure or
unsafe. Going forward, SSL/TLS certificate may become a mandatory website hosting requirement. By hosting a website with SSL/TLS certificate, it provides
security to the data
transferred between the website and the Website visitor, by encrypting the
communication, in addition to this the SSL/TLS certificate also helps to verify
the identity of the site, thereby helping users to surf on a secure and
encrypted connection. The SSL certificate consists of Website Owner information
including Domain and sub-domain name, the Validity period of the certificate, Public
key used for encryption
TLS
is the new or updated version of SSL; TLS has
evolved from SSL (Secure Socket Layer) only, which was developed by Netscape
Communication in 1994. SSL 1.0 was never used but followed by SSL and 3.0. TLS 1.0 is based on SSL 3.0. TLS
1.3 is the latest version, published in the year 2018 and almost all Cas are using or moving to
TLS1.3. The presence of secure connection or TLS can be seen through HTTPS presence
in URL, which is an implementation of TLS encryption on top of HTTP protocol,
which is used by all the websites running web services. Hence, any website over
https is deploying TLS only.
SSL
CERTIFICATE VALIDATION AT DIFFERENT LEVELS:
1) DOMAIN VALIDATED
CERTIFICATE: In this validation, only a domain name is validated and a certificate is
issued in this validation name only. That’s why it is the easiest
validation in the SSL certificate validation game. It is beneficial for servers
who are just willing to take SSL for namesake or blogs, and small enterprises not
dealing with products or selling.
2) ORGANISATION VALIDATED
CERTIFICATE: In this validation, additional details like the address of that particular
server with the domain name will be required for the validation check to pass. Thus, it
is a bit more stringent than domain one. The additional details validation makes it
more trustworthy on the user’s end.
3) EXTENDED VALIDATION CERTIFICATE: This is the most
cost-equipping, trustworthy, time taking validation. This is required by all
the large e-commerce, enterprises and business to mark up with the customer
trust level.
TYPES OF
SSL CERTIFICATES:
1) Single Domain SSL: As the name defines, it
is a single domain name, thus, only and only single name domain SSL will be
generated, and no other name or sub-domain name will be able to use the
certificate.
2) Wildcard SSL
certificate: The domain and all sub-domain along with this will be able to use the
certificate known as Wildcard SSL. The sub-domain list can be seen by clicking
on the padlock icon in the URL.
3) Multidomain SSL
certificate: Multiple distinct domains can use a single certificate issued in the name
of all the distinct domains. The domains are neither the sub-domain of a single
domain nor the multiple pages of a single domain.
|
Phase 1:
This is Establish Connection Phase. The client sends
a ‘HELLO’ message with its TLS version, List of Cipher Suites and Random
Client’s Number and the server replies with a ‘Hello’ message along with its
SSL certificate, Cipher suite chosen and a Random Server’s number.
Phase 2: This is the Pre-secret master key
Generation Phase. A client sends one more random string which
is encrypted with a Public key (which is taken from Server’s SSL certificate),
commonly called a ‘pre-secret master key’. The server decrypts this secret key
with the private key of its certificate.
Phase 3: This is thesession key Generation
Phase. The client as well as the server generates the session key
using its own random numbers and pre-secret master key. The session key at both
ends generated will be the same.
Phase 4: Handshake Ends. The
session key will be verified and authenticated at both ends, it should be the same,
then only a secure connection is established and the data moves now in an
encrypted manner. If anyhow the key differs, the connection won’t be
established. Once the connection is established both client and server send a ‘Finished’ message to each other and a green signal for encrypted data transfer
will proceed.
This TLS/SSL handshake is validated till TLS1.2, in
TLS 1.3 the handshake has been changed a little bit. In place of a 4-way
handshake, it is now based on 2-step handshake validation or completed in just
one round trip of a handshake. The TLS1.3 is more secure, encrypted and less time
taking than all the previous versions.
UPGRADE IN TLSV1.3:
Phase 1: Establish
Connection. Same as TLS1.2 Phase 1, TLS1.3 also commences the handshake with the “Hello” message with an add-on
of a list of supported cipher suites and a guess of which key agreement protocol
will be chosen by the server along with the Client’s chosen key agreement protocol.
Phase 2: Validation
Completion. The server replies with a “Hello” message with the key agreement protocol that it has chosen, key
share, certificate and ‘Finished’ message.
The Server “Finished”
message, which was sent in the 6th step in the TLS1.2 handshake, is sent
in the second step in TLS1.3. Thus, completing the round trip in just 2 steps.
Phase 3: Finished Message. In the last step, the client will validate the server certificate, and generate a key share while using the key of the server. Once all the checklists
are done client sends a “Finished” message. Now, the data encryption begins.
Cipher Suite: A complete set of cryptographic algorithms
require to secure a network connection through SSL/TLS. For each set, there is a
specific algorithm. The SSL/TLS does the
Handshake process for building the secure connection and during the handshake,
the client and the web server will use the following cipher suite components:
O A key exchange algorithm is used to determine how
symmetric keys in the handshake will be exchanged. Example: RSA
(Rivert-Shamir-Adleman).
O An authentication algorithm, which
function is to tell how the authentication at both ends client as well as
server will be implemented and finished. Example: DSA (Digital Signature
Algorithm).
O An Encryption cipher, to encrypt the data. Example: AES
(Advanced Encryption Standard)
O A Message Algorithm, a function is to check and
administrate how the data integrity checks will be carried out. Example: SHA
(Secure Hash Algorithm)
Comments
Post a Comment