Chapter 8: Problem 21
Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with correct TCP checksum and sequence numbers (and correct IP addresses and port numbers). Will SSL at the receiving side accept the bogus packet and pass the payload to the receiving application? Why or why not?
Short Answer
Step by step solution
Understanding SSL session
Checking SSL data encryption
Evaluating the attacker's packet
SSL decryption failure for bogus packet
Verification by SSL
Decision of the SSL receiver
Unlock Step-by-Step Solutions & Ace Your Exams!
-
Full Textbook Solutions
Get detailed explanations and key concepts
-
Unlimited Al creation
Al flashcards, explanations, exams and more...
-
Ads-free access
To over 500 millions flashcards
-
Money-back guarantee
We refund you if you fail your exam.
Over 30 million students worldwide already upgrade their learning with Vaia!
Key Concepts
These are the key concepts you need to understand to accurately answer the question.
TCP Segment
- Source and destination ports
- Sequence number
- Checksum for error-checking
Data Encryption
Encryption involves algorithms and encryption keys. In an SSL session, shared session keys are created during a secure handshake and used to encrypt all transmitted data, ensuring that even if a malicious party intercepts the data, they cannot understand it without the key.
Whenever data is received, it must be decrypted back into its original form before usage. This process confirms the data’s authenticity, preventing malicious alterations. For Alice and Bob, the encrypted messages ensure their communications are both confidential and tamper-proof.
Session Keys
When Alice and Bob begin their SSL conversation, they first agree on session keys through a secure handshake process. These keys are then used to encrypt and decrypt the data exchanged between them for the duration of their connection.
Session keys provide several advantages:
- Security: They ensure each session has unique encryption, preventing interceptions of past messages from compromising current communications.
- Performance: Temporary keys can be generated easily and quickly, making them efficient compared to persistent keys.
Message Authentication Code (MAC)
The process involves:
- Generating a MAC value from a message using a secret key.
- Sending this MAC along with the message.
- Upon receipt, the receiver generates a MAC from the received message and compares it to the transmitted MAC.
In the scenario where an attacker sends a bogus TCP segment, the MAC verification will fail since the attacker, lacking the session keys, cannot produce the correct MAC. This verification is crucial in confirming the security and authenticity of communication in SSL sessions.