What are the items required to build a complete security protocol?
What are the steps in a security protocol handshake?
1) Bob establishes TCP connection with Alice
2) Bob verifies Alice’s identity (certificate)
3) Bob sends Alice master secret key MS (used to generate all other keys for session)
Potential Issue: 3 RTTs before client can start receiving data
What are the steps in the key derivation process in a security protocol?
What layer of the protocol stack does TLS sit in?
Technically the Application layer, but could be considered in-between Application and Transport layer
What protocol does TLS replace?
Secure Socket Layer (SSL)
What types of applications is TLS built to support?
Any type of application (e.g. HTTPS is HTTP with messages sent over TLS / SSL)
How does TLS enforce confidentiality?
Through symmetric encryption.
How does TLS enforce integrity?
Through MAC
How does TLS enforce authentication?
Through public key cryptography and certificates
TLS supports several algorithms for different security functions. Which are these functions?
How does TLS choose a cipher suite?
Describe QUIC