140 likes | 370 Views
Ceremony Analysis. Carl Ellison Microsoft 20 April 2005. Bob. Alice. Carol. Distributed System w/ Security. A. B. C. D. Alice. Bob. Carol. Design Process. A. B. C. D. Alice. Bob. Carol. The Real (Full) Protocol. A. B. C. D. No, THIS is the Protocol !!!!. A. B. C.
E N D
Ceremony Analysis Carl Ellison Microsoft 20 April 2005
Bob Alice Carol Distributed System w/ Security A B C D
Alice Bob Carol Design Process A B C D
Alice Bob Carol The Real (Full) Protocol A B C D
No, THIS is the Protocol !!!! A B C D
Alice Bob Carol OK, this is a Ceremony A B C D Ceremony Protocol
HTTPS / SSL / TLS Web Site User HTTP(S) PC a Establish Channel b c d e f
HTTPS MITM Protocol Legitimate MITM User HTTP(S) HTTP(S) PC Channel Setup a b c d
HTTPS MITM Ceremony Legitimate MITM User HTTP(S) HTTP(S) PC a Channel Setup b c d e f g
HTTPS Example Phishing
S/MIME Ceremony Sender Recipient PC PC a b c d e f
S/MIME Ceremony Concerns Sender Recipient PC PC a b c d e f