📜 ⬆️ ⬇️

TLS and Web Certificates

Hello!

And here we are running on the sly one of the most unusual courses for us - “Digital Signature in Information Security” . Despite everything, we sort of managed it and attracted people, let's see what happens. And today we will analyze the remaining interesting material and see briefly how TLS works, as well as the difference between untrusted and trusted web certificates.

Translation - dzone.com/articles/a-look-at-tls-transport-layer-security
Author - Arun Pandey

TLS, short for Transport Layer Security, is based on SSL. As the name suggests, this is a protocol that works at the transport level.
As you know, communication security is a very common headache, but the correct implementation of TLS can take web security to a new level. In an environment with embedded TLS, an attacker can get information about the host to which you are trying to connect, find out what encryption is being used, terminate the connection, but doing something other than that will not work.
')
Almost all communication protocols have three main parts: data encryption, authentication and data integrity.

In this protocol, data can be encrypted in two ways: using a public key cryptosystem or symmetric cryptosystems. The public key cryptosystem, as a realization, is more perfect than symmetric cryptosystems.



Overview of Cryptosystems with Public Key and Symmetric Cryptosystems

A public key cryptosystem, which is a type of Asymmetric Encryption, uses an open-private key. So, public key B is used to encrypt A data (B shared the public key with A), and after receiving the encrypted data B decrypts it using its own private key.

In Symmetric Cryptosystems, the same key is used for both decryption and encryption, therefore the secret key of A and B will be the same. And this is a big disadvantage.

Now let's see how authentication works in TLS. To ensure the authenticity of the sender of the message and provide the recipient with the means to encrypt the response, authentication can be achieved using digital certificates. Operating systems and browsers store lists of trusted certificates that they can confirm.

Trusted vs. Untrusted Certificates

Digital certificates come in two categories. Trusted certificates are signed by the Certificate Authority, CA for short, while untrusted certificates are self-signed.

Trusted Certificates

Trusted certificates are in a web browser and signed by the CA. This is necessary to ensure the highest level of reliability. Suppose that the site “xyz.com” wants to receive a trusted digital certificate from the well-known certification center “Comodo”.
The steps will be as follows:


Untrusted Certificates

An untrusted certificate is signed by the site owner. This method is suitable if the problems of reliability are not relevant.
Note that it is not customary to use an untrusted certificate in the TLS implementation.

How TLS Certificate Replacement Works


THE END

As usual, we are waiting for questions and comments.

Source: https://habr.com/ru/post/431242/


All Articles