SSL/TLS VPN Technologies
VerifiedAdded on 2023/01/11
|7
|1361
|55
AI Summary
This document discusses SSL and TLS authentication in VPN technologies. It explains how web browsers and servers communicate, and how SSL and TLS provide authentication. It also describes the process of digital signatures and their role in authentication. Additionally, it explores methods used by servers to ensure communication with the right client.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
SSLTLS VPN Technologies
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
1b) VPN, Authentication and Access Control.................................................................................3
REFERENCES................................................................................................................................7
2
1b) VPN, Authentication and Access Control.................................................................................3
REFERENCES................................................................................................................................7
2
1b) VPN, Authentication and Access Control
How browser ensure that it is communicating in right server and explain that how SSL and TLS
provide the authentication.
Web browser and web server are playing important function and works together as a
client server system. Within computer networking, client-server is based on the standard method
for designing application where data is kept in central locations. It is efficiently shared with large
number of other hardware on request (Abdou and Oorschot, 2017). The web browser perform the
communication by using TCP/IP and consider as standard application protocol that always
support for giving permission. In order to maintain the browser request and server response. It
enabling different brands of web browser to communication with multiple brand of web browser
without requiring logical combination.
SSL and TLS provide the authentication
For Sever authentication, Client is mainly used the server’s public key to encrypt the data
and also used to computer secrete key. The client server may generate the secrete key which
directly decrypt the data with the help of corrective private key.
For client authentication
Server uses public key in the client certificate to easily decrypt the data. Afterwards, it
will be completing the authentication process effectively and efficiently.
If in case authentication steps fails and it directly fails handshake, automatically terminates
session.
The exchange of digital certificates performed during SSL and TLS handshake. It is to be
considered as authentication process and identifying more information how certificate provide
the better protection against threats (Brown and Jenkins, 2016).
For Sever authentication
SSL and TLS server needs some important detailed which always support for managing
communication between server.
The person certificate issued to server by client authentication
Use server’s private key
If SSL and TLS server need an appropriate client authentication whereas server verifies the
client’s identity with the help of digital certificate with public key. CA issued as personal
certificate to particular client. Both client as well as server authentication. The servers needs :
3
How browser ensure that it is communicating in right server and explain that how SSL and TLS
provide the authentication.
Web browser and web server are playing important function and works together as a
client server system. Within computer networking, client-server is based on the standard method
for designing application where data is kept in central locations. It is efficiently shared with large
number of other hardware on request (Abdou and Oorschot, 2017). The web browser perform the
communication by using TCP/IP and consider as standard application protocol that always
support for giving permission. In order to maintain the browser request and server response. It
enabling different brands of web browser to communication with multiple brand of web browser
without requiring logical combination.
SSL and TLS provide the authentication
For Sever authentication, Client is mainly used the server’s public key to encrypt the data
and also used to computer secrete key. The client server may generate the secrete key which
directly decrypt the data with the help of corrective private key.
For client authentication
Server uses public key in the client certificate to easily decrypt the data. Afterwards, it
will be completing the authentication process effectively and efficiently.
If in case authentication steps fails and it directly fails handshake, automatically terminates
session.
The exchange of digital certificates performed during SSL and TLS handshake. It is to be
considered as authentication process and identifying more information how certificate provide
the better protection against threats (Brown and Jenkins, 2016).
For Sever authentication
SSL and TLS server needs some important detailed which always support for managing
communication between server.
The person certificate issued to server by client authentication
Use server’s private key
If SSL and TLS server need an appropriate client authentication whereas server verifies the
client’s identity with the help of digital certificate with public key. CA issued as personal
certificate to particular client. Both client as well as server authentication. The servers needs :
3
The personal certificate issue to CA.
Client private key
Sever private key
Client authentication certificate
As per discussion, it has identified that both SSL and TLS server and client might need client
authentication certificate to form into root chain. In order to establish the connection between
client and server side.
Describe how digital signature work and identifying the role pays in the authentication process.
What happens during certificate verification?
Digital signature is based on the process that provide guarantee content of message and
have not been altered. In the server, digitally sign an appropriate document that have added one-
way encryption of message. The process will use public and private key pair but client still read
the content (Hall, Covarrubias and Kirschbaum, 2017). Digital signature process will create the
signature only server public key can decrypt. In the client side, it may use server’s public key
which easily validate the sender and establish as integrity of message. For Example- retail
enterprise uses digital signature as public key encryption to protect the sensitive information or
data.
4
Client private key
Sever private key
Client authentication certificate
As per discussion, it has identified that both SSL and TLS server and client might need client
authentication certificate to form into root chain. In order to establish the connection between
client and server side.
Describe how digital signature work and identifying the role pays in the authentication process.
What happens during certificate verification?
Digital signature is based on the process that provide guarantee content of message and
have not been altered. In the server, digitally sign an appropriate document that have added one-
way encryption of message. The process will use public and private key pair but client still read
the content (Hall, Covarrubias and Kirschbaum, 2017). Digital signature process will create the
signature only server public key can decrypt. In the client side, it may use server’s public key
which easily validate the sender and establish as integrity of message. For Example- retail
enterprise uses digital signature as public key encryption to protect the sensitive information or
data.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The digital signature can be considered as numerical data value that will be represented as
sequence of characters. It is helping to create digital signature which is consider as complex
process but efficient in security provider. Initially, it can obtain the digital signature from
certificate authority (Lo and et.al., 2016). In order to protect or secure document through digital
certificate. However, it will create and use self-signed certificate to secure information.
Afterwards, it also verifying the authenticity through digital signature. Furthermore, Digital
signature authenticate the particular source of message through electronic mail. It directly
coordinate the ownership of digital certificate is bound to particular users. The authentication
process will support for sending correct data from sender to receiver.
During verification process, signature check the validity of content and wehether identify any
chnages in the documents. When the digital signature is validated, it may appears as dcoument
message to indicate the proper status of signature.
Setting up digital signature validation
When it will receive the signed document and it may validate the signature and also
verifying the content in proper manner. Sometimes, it depend on the configured application and
occurs validated automatically. Signature validity is identified by checking the proper
authenticity of digital signature certifcate.
Analyse and comment on how server make sure that communication to right client. Discuss
about the several methods.
When it has established the two-way communication between client and server. So as
needed to authenticate that communication occurs to right client. In this way, it can be used
client certificate method which mainly contain username and information to make sure the
certificate. Clients typically established the connection with server by using TCP/IP protocol.
5
sequence of characters. It is helping to create digital signature which is consider as complex
process but efficient in security provider. Initially, it can obtain the digital signature from
certificate authority (Lo and et.al., 2016). In order to protect or secure document through digital
certificate. However, it will create and use self-signed certificate to secure information.
Afterwards, it also verifying the authenticity through digital signature. Furthermore, Digital
signature authenticate the particular source of message through electronic mail. It directly
coordinate the ownership of digital certificate is bound to particular users. The authentication
process will support for sending correct data from sender to receiver.
During verification process, signature check the validity of content and wehether identify any
chnages in the documents. When the digital signature is validated, it may appears as dcoument
message to indicate the proper status of signature.
Setting up digital signature validation
When it will receive the signed document and it may validate the signature and also
verifying the content in proper manner. Sometimes, it depend on the configured application and
occurs validated automatically. Signature validity is identified by checking the proper
authenticity of digital signature certifcate.
Analyse and comment on how server make sure that communication to right client. Discuss
about the several methods.
When it has established the two-way communication between client and server. So as
needed to authenticate that communication occurs to right client. In this way, it can be used
client certificate method which mainly contain username and information to make sure the
certificate. Clients typically established the connection with server by using TCP/IP protocol.
5
TCP is based on the connection oriented which means that connection established and
maintained through application program. In order to exchange information from sender to
receiver side. But it is important to authenticate right client so that it can easily secure the data in
proper manner.
Sever client server communication method:
It is mainly used for securing all data between client and server. It is not just
authentication. Communicate with server over HTTPS/TLS with properly certificate of particular
client. Afterwards, it should be verified the username and more information to client by using
digital certification (Mali and et.al., 2017). In order to verify or validate the data. It can be used
certificate for HTTPS/TLS receiving the signals and client will communicate with server through
HTTPS/TLS.
SSL authentication: it is another method for enabling the configuration to require
authentication, validated by server on client identity. It is useful for identifying the client
authentication request by using digital signature. It uses the digital signed data to validate public
key in the certification. For Example- when student use education Moodle to access information
or data but it require to authenticate particular client. So as they can use SSL authenticate to
verify or validate particular client in proper manner. SSL enabled sever to maintain the list
trusted client authentication. It help for identifying the certificate of server acceptance.
Logon authentication: it is another way to verify the authenticate client in order to
establish connection with server. It is based on the enter password and insert associated PIN
which providing validate information of client. In this way, it prove that server establish
connection with authorise person.
6
maintained through application program. In order to exchange information from sender to
receiver side. But it is important to authenticate right client so that it can easily secure the data in
proper manner.
Sever client server communication method:
It is mainly used for securing all data between client and server. It is not just
authentication. Communicate with server over HTTPS/TLS with properly certificate of particular
client. Afterwards, it should be verified the username and more information to client by using
digital certification (Mali and et.al., 2017). In order to verify or validate the data. It can be used
certificate for HTTPS/TLS receiving the signals and client will communicate with server through
HTTPS/TLS.
SSL authentication: it is another method for enabling the configuration to require
authentication, validated by server on client identity. It is useful for identifying the client
authentication request by using digital signature. It uses the digital signed data to validate public
key in the certification. For Example- when student use education Moodle to access information
or data but it require to authenticate particular client. So as they can use SSL authenticate to
verify or validate particular client in proper manner. SSL enabled sever to maintain the list
trusted client authentication. It help for identifying the certificate of server acceptance.
Logon authentication: it is another way to verify the authenticate client in order to
establish connection with server. It is based on the enter password and insert associated PIN
which providing validate information of client. In this way, it prove that server establish
connection with authorise person.
6
REFERENCES
Book and Journals
Abdou, A. and Oorschot, P.V., 2017. Server location verification (slv) and server location
pinning: Augmenting tls authentication. ACM Transactions on Privacy and Security
(TOPS). 21(1). pp.1-26.
Brown, C.W. and Jenkins, M., 2016. Analyzing proposals for improving authentication on the
TLS-/SSL-protected Web. International Journal of Information Security. 15(6). pp.621-
635.
Hall, B.J., Covarrubias, P.O. and Kirschbaum, K.A., 2017. Among cultures: The challenge of
communication. Routledge.
Lo, N.W. and et.al., 2016. Security Analysis on Yu et al.’s Group Certificate Digital Signature
Scheme for EMR Authentication Process. International Journal of Applied Engineering
Research. 11(8). pp.5382-5388.
Mali, A. and et.al., 2017. Digital Signature Authentication and Verification on Smart Phones
using CRιPT Algorithm.
7
Book and Journals
Abdou, A. and Oorschot, P.V., 2017. Server location verification (slv) and server location
pinning: Augmenting tls authentication. ACM Transactions on Privacy and Security
(TOPS). 21(1). pp.1-26.
Brown, C.W. and Jenkins, M., 2016. Analyzing proposals for improving authentication on the
TLS-/SSL-protected Web. International Journal of Information Security. 15(6). pp.621-
635.
Hall, B.J., Covarrubias, P.O. and Kirschbaum, K.A., 2017. Among cultures: The challenge of
communication. Routledge.
Lo, N.W. and et.al., 2016. Security Analysis on Yu et al.’s Group Certificate Digital Signature
Scheme for EMR Authentication Process. International Journal of Applied Engineering
Research. 11(8). pp.5382-5388.
Mali, A. and et.al., 2017. Digital Signature Authentication and Verification on Smart Phones
using CRιPT Algorithm.
7
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.