Title: WTLS%20(Wireless%20Transport%20Layer%20Security)
1WTLS (Wireless Transport Layer Security)
- Youngho Choung
- Yhchoung_at_cs.uh.edu
2Contents
- Why we need WTLS?
- What is WTLS?
- What is TLS (SSL3.0) ?
- WTLS Functions
- Security Algorithm
- WTLS specifications
- Other Technologies
3Why we need WTLS ? (1/2)
- What can we do through the Cell Phone?
- Communication
- Using Internet
- E-commerce
- On-line banking
- Trading Stock
- Electric Cash
- Electric ID
- Watching movie, take a picture etc ?
4Why we need WTLS ? (2/2)
- Environment problems
- We need Security Solutions
5What is WTLS ? (1/2)
6What is WTLS ? (1/2)
7What is TLS (SSL3.0) ? (1/3)
- TLS stand for Transaction Layer Security
- SSL stand for Secure Socket Layer
8What is TLS (SSL3.0) ? (2/3)
9What is TLS (SSL3.0) ? (3/3)
10WTLS Functions
- Data Integrity
- Privacy
- Authentication
- DoS (Denial of Service) protection
- Optional
11Security AlgorithmHash Function
Any Length Plain Text
Hash Function
MD5, MD4, Hash, SHA-1, etc
Fix length Encrypted Text
12Security AlgorithmBlock Cipher
13Security AlgorithmBlock Cipher
14Security AlgorithmPublic Key
- Key distribution is difficult
- Tow Communicants already share a key or have the
use of a key distribution center - Characteristic
- (public) encryption key ? (private) decryption key
15Security AlgorithmPublic Key
16WTLS Specifications (1/5)
- Handshaking protocol
- Full handshaking protocol
- Abbreviated handshaking protocol
- Optimized handshaking protocol
- Alert protocol
- Change Cipher spec protocol
- Record protocol
17WTLS Specifications
18WTLS Specifications
19WTLS Specifications
- Optimized full handshaking
ServerHello Certificate ChangeCipherSpec Finishe
d
ChangCipherSpec Finished Application Data
20WTLS Specifications (4/5)
- Alert protocol
- Change Cipher spec protocol
21WTLS Specifications (5/5)
22Lets talk aboutlater..?
- WALS(Wireless Application Layer Security)
- WPKI(Wireless Public-Key Infrastructure)
- WIM(WAP Identity Module References