Module 5
Module 5
1. 1) Transport-Level Security
Here’s your detailed 10-mark answer for Transport-Level Security (TLS) so you can write it
exactly in your exam — with a diagram included.
1. Definition (2 Marks)
It ensures:
TLS is the successor to Secure Sockets Layer (SSL), offering stronger encryption and better
security mechanisms.
2. Purpose (2 Marks)
a) Confidentiality:
Data is encrypted so that even if intercepted, it cannot be read without the correct decryption key.
b) Integrity:
TLS uses Message Authentication Codes (MACs) to ensure that no unauthorized changes
occur in the transmitted data.
c) Authentication:
TLS uses X.509 certificates issued by trusted Certificate Authorities (CAs) to verify server (and
optionally client) identity.
1. Client Hello:
4. Components (1 Mark)
5. Advantages (1 Mark)
Strong encryption prevents eavesdropping.
Authentication ensures trust between parties.
Integrity checks protect against data tampering.
6. Diagram (1 Mark)
Below is a simple TLS Handshake Diagram you can draw in the exam:
Client Server
| Client Hello ----------------> |
| <--------------- Server Hello |
| <--------------- Certificate |
| Key Exchange ----------------> |
| <----------- Change Cipher Spec |
| Change Cipher Spec ------------>|
| Finished --------------------->|
| <-------------------- Finished |
If you want, I can also give you a neatly labeled box-and-arrow diagram for TLS that you can
directly copy into your answer sheet so it looks more professional and earns full marks.
Here’s a detailed, exam-ready answer for Secure Sockets Layer (SSL) in the same style as your
TLS notes.
1.
Definition
(2 Marks)
Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide secure
communication over the internet. It encrypts the data between the client (e.g., a web browser)
and the server, ensuring confidentiality, integrity, and authentication. SSL is the predecessor of
Transport Layer Security (TLS), but the term “SSL” is still commonly used for both.
2.
Purpose
(2 Marks)
Confidentiality: Encrypts the data so only the intended recipient can read it.
Integrity: Detects any alteration in the data during transmission.
Authentication: Uses digital certificates to verify the identity of the server (and
optionally the client).
3.
(3 Marks)
1. Client Hello:
o The client sends the supported SSL versions, cipher suites, and a random number.
2. Server Hello:
o The server selects a cipher suite and sends its digital certificate.
3. Server Authentication & Key Exchange:
o The client verifies the server’s certificate and generates a session key (either RSA
key exchange or Diffie-Hellman).
4. Change Cipher Spec:
o Both client and server switch to encrypted communication using the agreed
session key.
5. Finished Messages:
o Both sides send encrypted “finished” messages to confirm the secure connection.
4.
Components
(1 Mark)
5.
Advantages
(1 Mark)
6.
Diagram
(1 Mark)
Client Server
| ---- Client Hello ---> |
| <--- Server Hello ---- |
| <--- Certificate ----- |
| ---- Key Exchange ---> |
| ---- Change Cipher --->|
| <--- Change Cipher ----|
| ---- Finished -------->|
| <--- Finished -------- |
[ Secure Encrypted Link ]
If you want, I can also prepare TLS and SSL together in a comparison table so you can write it
directly for a 10-mark “difference between” question without confusion. Would you like me to
do that next?
3) Web Security Considerations