Wireless security and cryptography
Chapter 5: Wireless security and cryptography
This chapter covers how SSL/TLS uses cryptographic tools to secure data, and how the IEEE 802.11 wireless standard enforces security through authentication, encryption, and integrity mechanisms
This chapter covers how SSL/TLS uses cryptographic tools (symmetric encryption, asymmetric encryption, and hashing) to secure data over the Internet, and how the IEEE 802.11 wireless standard enforces security through authentication, encryption, and integrity mechanisms.
SSL/TLS (Secure Sockets Layer/Transport Layer Security) uses a combination of cryptographic tools to secure data transmitted over the internet. Here are the main points regarding how each tool is utilized:
1. Asymmetric Encryption (Public-Key Cryptography)
Used for key exchange and authentication.
The server (and optionally the client) has a public-private key pair.
The public key is shared openly, while the private key is kept secret.
TLS Handshake: Asymmetric encryption is used to:
Verify the server’s identity via digital certificates (issued by a Certificate Authority).
Securely exchange a pre-master secret, which is used to derive symmetric keys.
Common algorithms: RSA, Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC).
2. Symmetric Encryption
Used for bulk data encryption after the handshake.
Both client and server use the same shared key to encrypt/decrypt data.
Faster than asymmetric encryption, making it ideal for securing large amounts of data.
The symmetric key is derived from the pre-master secret (agreed upon during the handshake).
Common algorithms: AES (Advanced Encryption Standard), ChaCha20, 3DES (legacy).
3. Hashing (Integrity Protection)
Ensures data integrity—detects tampering during transmission.
Hash functions generate a fixed-size digest (e.g., SHA-256) of the data.
Used in:
Message Authentication Code (HMAC) to verify message integrity.
Digital signatures (in certificates) to authenticate the sender.
Common hash functions: SHA-256, SHA-384, SHA-3.
How SSL/TLS Combines These Tools
Handshake Phase (Asymmetric Encryption)
Client and server agree on encryption protocols.
Server sends its certificate (containing its public key).
A shared pre-master secret is exchanged securely (using RSA or Diffie-Hellman).
Both sides derive the same symmetric session keys.
Secure Data Transfer (Symmetric Encryption)
All further communication is encrypted using the symmetric key.
Integrity Check (Hashing)
Each message includes a MAC (Message Authentication Code) to ensure it wasn’t altered.
Summary Table
Cryptographic Tool
Purpose in SSL/TLS
Examples
Asymmetric Encryption
Key exchange, authentication
RSA, ECDH, ECDSA
Symmetric Encryption
Encrypting application data
AES, ChaCha20
Hashing
Data integrity, certificate signing
SHA-256, HMAC
This combination ensures confidentiality (via encryption), authentication (via certificates), and integrity (via hashing) for secure internet communication.
A simplified TLS 1.3 handshake (modern standard):
Client Hello → Supported cipher suites, TLS version.
Server Hello → Chooses cipher, sends certificate.
Key Exchange → Ephemeral keys (ECDHE, etc.).
Finished → Encrypted communication begins.
Integrity in SSL
TLS ensures message integrity in two phases:
Before session keys: Integrity is checked via digital signatures (handshake).
After session keys: Integrity is checked via HMAC (TLS 1.2) or AEAD (TLS 1.3).
Handshake Phase (handshake integrity and authentication):
The server’s certificate is verified using CA signatures.
Hashed handshake messages may be signed (e.g.,
CertificateVerify
in TLS 1.3).Not HMAC/AEAD yet—these are for encrypted data only.
Encrypted Data Phase (post-handshake data integrity):
TLS 1.2: Uses HMAC (e.g., HMAC-SHA256) to verify each encrypted record.
TLS 1.3: Uses AEAD (e.g., AES-GCM) for built-in encryption + integrity.
This ensures both the handshake and application data are protected against tampering.
Authentication in SSL
Privacy in SSL
Last updated