Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access any website (which uses HTTPS) online via a web browser. It is a well-known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail what technologies and techniques are used to prevent attackers from modifying the communication between you and web server and what keeps your passwords and other details safe.
You are required to address the following topics and task in details in your report:
- Analyse and write report on how the browser ensures that it is communicating to the right server. Please visit a website and add screenshots also highlighting the related part.
- Describe how digital signatures work and what is role in authentication process, add the relevant screenshot from your web browser showing the details of signature.
- Analyse and write report on how the server make sure that it is communicating to the right client, discuss several methods; e.g. if you are using MIT Moodle, how the server verifies that it’s actually YOU?
- Analyse and write a report on how the confidentiality and integrity is achieved in SSL communication, and how server & client agree on one cipher suit?
- Explain what the role of symmetric encryption and hash algorithms in SSL communication is. Add screenshots from your browser showing symmetric encryption and hash details.
1. Analyse and write a report on how the anti-replay attacks are mitigated in SSL communication.
Authentication
The virtual private network can be explained as the software that is used for the purpose of enhancing internet security. Virtual private networks helps in the creating added security by enhancing the private network. The VPN works in top of the browsers in order to enhance the security. In order to enhance the security the VPN creates a safe zone where the network is restricted [7]. On the other hand the digital signatures can be explained as the digital form of a signature which uses the concept of cryptography for encryption. This paper explains about some of the most enhanced security options that can help the user to make the internet world safe.
The web browsers and the servers communicate in between each other using the TCP/IP protocols. Further the hypertext transfer protocol helps in the process providing extra support to the web browsers and providing extra security to the servers. The connection starts when the user whites or specifies the web address of the website [5]. The browser then initiates a TCP connections where the browser reaches the server and the finds out the IP address of website. After the websites IP is checked the browser requests the HTTPS of the hypertext transfer protocol secured content form the servers. After this the acknowledgement is done and the content is checked and the webpage is displayed in the browser. This ensures that there is proper security in the services of the servers and there is no fault regarding this.
(Figure1: Browser Server Communication)
(Source:[9])
The digital signatures are the signatures which are made in the digital form which helps in the process of the increased security and options. Further this digital signatures are uniquely encrypted so that these can help in the process of security. This works like there are certain user signs a using a digital device. The signature is then encrypted using the public key cryptography format and a hash key is generated for the same [7]. The hash key is then saved for the future purpose of checking. When there is a need of authentication for the same, when the user signs a signature a hash key is generated and this hash key is checked with the previous hash key. If there is a match then the signature is authorised. This digital signatures helps in the process of checking the security off any system [6]. It is one of the most secured method for the process of keeping data safe as no 2 signatures can be same. Hence this is one of the best way for the process of keeping data safe.
(Figure 2: Browser Signature Workflow)
(Source:[10])
When a server requests for the connection with the client, then at first the server cheeks whether the connection is secured or not and whether it is working in the HTTPS protocol or not. If the server check is done properly then the server sends back a content file to the browser. The content file contains the login instruction or create account instruction. The first time the user needs to create an account for the server if the service provider [1].
Browser and server connection
When the account is created the user is asked for specific details like the user email id and the passwords. Once the user is registered the server saves the details of the user. When the client needs to log in again the user needs to give the registered user id and the password and the server checks for the same. If the registered email id is found out then it lets the user to access the server else not. This helps the users to maintain a proper security and also helps the servers to check for the authenticity of the users.
The SSL or the secured socket layer can be explained as a standard that is used for the purpose of the establishing encrypted lines in-between the web servers and the web browsers for the purpose of the online communication [3]. The SSL helps in the process of the creating a certificate for the purpose of the providing extra security. The SSL and the TSL provides the users with the authentication, identification and the confidentiality and maintaining proper integrity. The authentication helps in the process of the authenticating the user that is to check whether to check if the user is correct or not [2]. These are done using the processes of the cryptography and hence reduces the chances of the any threat from the world.
The symmetric algorithm can be explained as the process in which a single key is used for the both the purpose of the encryption and decryption. This is not one of the best way for the process of the security in the public domain but can help in the process of the security in the private transactions. The hash algorithms can be explained as the process of the encrypting a certain message using the process of the cryptography. This is one of the most secured thing that can be done in order to enhance the security of the servers. The hash keys are using in the symmetric connections hence ensures that there is proper security maintained in the transactions. [4] Further with the use of the hash keys there are no chances on of any hacking as these keys are very much tough to get hacked.
(Figure 3: Browser Hash details)
Source: [2]
The repay attack which is also known as the payback attacks can be explained as a form of network attack in which the authenticated data transmission is frequently repeated or delayed. It can be carried out using the intercepting the transmitting data through a network channel. This can be explained as one of the most dangerous form of attack that is made in the network sources. This helps the hackers to access the information that is being transferred and then send false data to the source [9]. This can be reduced by sending encrypted data to the sources and hence reduce the chances of any such risk. Using the SSL or the secured socket layer is one of the other major use of this where the user data can be encrypted suing the symmetrical or the asymmetrical use of the data and hence reduce the chances of this type of the risk. The encryption process stops the hacker from accessing the data hence the data cannot be used.
Digital Signatures
Further the use of the secured layer socket connections helps the user to locate of there is any break in the journey of the data [8]. One of the other major way through which this can be reduced is the use of the timestamp and hence reduces the chances of data losses. This is one of the major form of attack that is often made in order to steal data but with the advancement of the network security thus type of attacks are often reduced.
Conclusion
Thus, concluding the topic it can be said that the VPN is one of the most secured thing that can be used for the purpose of the ensuring the security of the network. The VPN can be used for the purpose of the creating a secured filed where the data packets that are sent or received can easily be monitored. Further the SSL or the secured layer security is one of the other major thing that can be used for the purpose of the security of the devices. The SSL is one of the most secured thing that can be used for the purpose of the ensuring proper security to the devices.
References
Das, M. Swami, and A. Govardhan. "QoS web service Security Access Control case study using HTTP Secured Socket Layer Approach." In Proceedings of the The International Conference on Engineering & MIS 2015, p. 59. ACM, 2015.
Daman, Repu, and Manish M. Tripathi. "Encryption Tools for Secured Health Data in Public Cloud." International Journal of Innovative Science, Engineering & Technology 2, no. 11 (2015).
Yan, Ling, Matt Hicks, Korey Winslow, Cynthia Comella, Christy Ludlow, H. A. Jinnah, Ami R. Rosen, Laura Wright, Wendy R. Galpern, and Joel S. Perlmutter. "Secured web-based video repository for multicenter studies." Parkinsonism & related disorders 21, no. 4 (2015): 366-371.
Kishore, Neetu, and Seema Sharma. "Secured Data Migration from Enterprise to Cloud Storage-Analytical Survey." BVICAM's International Journal of Information Technology 8, no. 1 (2016).
Nugroho, Hary, Ega Dian Pramesta, and Cholifah Sulistin Angraeni. "Implementasi Virtual Private Network Openstack Terkoneksi Dengan Virtual Private Network Mikrotik Untuk Komunikasi Data Lebih Aman." Journal ICT 8, no. 15 (2017).
Yoo, Youngho, Reza Azarderakhsh, Amir Jalali, David Jao, and Vladimir Soukharev. "A post-quantum digital signature scheme based on supersingular isogenies." In International Conference on Financial Cryptography and Data Security, pp. 163-181. Springer, Cham, 2017.
Ducas, Léo, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé. "CRYSTALS-Dilithium: a lattice-based digital signature scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems 2018, no. 1 (2018): 238-268.
Beullens, Ward, and S. Blackburn. "Practical attacks against the Walnut digital signature scheme." Preprint. Available at https://eprint. iacr. org/2018/318/20180404 153741 (2018).
Bennett, Charles H., and Gilles Brassard. "Quantum cryptography: Public key distribution and coin tossing." Theor. Comput. Sci. 560, no. P1 (2014): 7-11.
Bos, Joppe W., Craig Costello, Michael Naehrig, and Douglas Stebila. "Post-quantum key exchange for the TLS protocol from the ring learning with errors problem." In Security and Privacy (SP), 2015 IEEE Symposium on, pp. 553-570. IEEE, 2015.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Security Technologies Used In HTTPS Communication: Analysis And Report. Retrieved from https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/a-report-on-the-vpn-for-enhancing-internet-security.html.
"Security Technologies Used In HTTPS Communication: Analysis And Report." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/a-report-on-the-vpn-for-enhancing-internet-security.html.
My Assignment Help (2020) Security Technologies Used In HTTPS Communication: Analysis And Report [Online]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/a-report-on-the-vpn-for-enhancing-internet-security.html
[Accessed 12 November 2024].
My Assignment Help. 'Security Technologies Used In HTTPS Communication: Analysis And Report' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/a-report-on-the-vpn-for-enhancing-internet-security.html> accessed 12 November 2024.
My Assignment Help. Security Technologies Used In HTTPS Communication: Analysis And Report [Internet]. My Assignment Help. 2020 [cited 12 November 2024]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/a-report-on-the-vpn-for-enhancing-internet-security.html.