Chapter 20. Securing sessions 641
Table 20-1 shows the categories of SSL service, the technologies used, and the
types of security attacks against which they offer protection.
Table 20-1 SSL services
SSL uses public-key encryption, symmetric encryption, hashing, digital
signatures, and certificates.
The main reasons why SSL incorporates both public-key and private-key
cryptography are to improve performance and to simplify key management.
Public-key cryptography offers the best security, but it is much slower than
private-key cryptography. SSL uses only public-key cryptography (specifically
RSA) for session initiation, which includes passing the secret symmetric key
needed for private-key cryptography. SSL uses private-key cryptography for all
data encryption after establishing the session (bulk encryption). This means that
SSL uses the maximum security to pass the secret key and then uses a faster
method for all consequent data to be exchanged.
Another important point to note is that when the browser contacts the server,
both the browser and the server have to agree on a common cipher that both can
use. It is like two people trying to talk to each other. One speaks French and
English, and the other person speaks English and Spanish. If they want to speak
to each other, they must use a language they both understand.
This means that a server with large-key-size support does not necessarily entail
a higher level of symmetric encryption if the browser does not support it. For
example, if the server supports 128-bit key encryption and the browser supports
only 40-bit encryption, then in this case the 40-bit encryption will be used to
encrypt data exchanged between the server and the browser.
For a complete and detailed description of public key infrastructures, refer to the
IBM Redbook Deploying a Public Key Infrastructure, SG24-5512.
SSL service Technology Protection
against
Authentication X.509 Certificates Fake entities
Integrity Message
Authentication
codes (Keyed hash
functions)
Vandals or entities
try to corrupt the
data
Privacy Encryption People try to read
confidential data