Transport Layer Security

994 Words2 Pages

Computers are used for nearly everything today, from entertainment to business, and even banking. Though convenient, this makes computers and the internet a prime target for fraud, and security paramount. Recently, however, there has been security exploit after security exploit, some of which need nothing more than typing in a website and clicking “Go!” A couple have even been known for years before being fixed. This creates debate whether computer security is in fact safe, or it is all a false hope.
One extremely common target is TLS. TLS, or Transport Layer Security, is the main protocol used in secure communication over the internet. All secure webpages are transferred using this protocol, or its predecessor SSL (Secure Sockets Layer), and “https” signals its usage. One main component is the public and private key encryption. In this setup, the private key can decrypt messages from the public key and the other way around, but cannot decrypt messages from itself; a private key can decrypt a public key message, but a private key cannot decrypt a private key message (Allen and et al. 12-13). Additionally, an optional extension to SSL/TLS called heartbeat is often used. It is enabled by default, cannot be easily turned off during operation, and works be repeating the message back to the sender; this is often used to see if a server is online and working.
In April of 2014, a major exploit of TLS utilizing the heartbeat was found. It was named Heartbleed for the fact that it “bled” data through the heartbeat. It worked by telling the server to repeat something, but giving the wrong size for it, similar to “send be the 6,000 letter word ‘cat’ if you are there.” The server then sent back the 6,000 letters, with the majority of them bei...

... middle of paper ...

...sion bounds check." 7 April 2014. OpenSSL: The Open Source toolkit for SSL/TLS. Web. 26 April 2014. .
Kitten, Tracy. Disagreement on Target Breach Cause. 10 February 2014. Web. 26 April 2014. .
Mutton, Paul. Half a million widely trusted websites vulnerable to Heartbleed bug. 8 April 2014. Web. 26 April 2014. .
Qualys, Inc. SSL Pulse. 5 April 2014. Web. 25 April 2014. .
Sherr, Ian and Nick Wingfield. Play by Play: Sony's Struggles on Breach. 7 May 2011. Web. 26 April 2014. .

More about Transport Layer Security

Open Document