What is a secure data exchange protocol providing privacy between to Internet application and authentication of server?

Network security protocols are network protocols that ensure the integrity and security of data transmitted across network connections. The specific network security protocol used depends on the type of protected data and network connection. Each protocol defines the techniques and procedures required to protect the network data from unauthorized or malicious attempts to read or exfiltrate information.

Related content: Learn more about network security threats security protocols can protect against.

The OSI Network Model

Open Systems Interconnection (OSI) is a reference model for how applications communicate over networks. It shows how each layer of communication is built on top of the other, from the physical wiring to the applications that attempt to communicate with other devices over the network.

The OSI is a reference model that guides technology vendors on the design of interoperable software and hardware, providing a clear framework that describes the capabilities of a network or communications system. For security teams, the OSI model helps understand which layers of the network they need to defend, where specific security threats could strike, and how to prevent and mitigate them.

The OSI Model contains the following layers:

  • Layer 1—Physical Layer—the physical cable or wireless connection between network nodes.
  • Layer 2—Data Link Layer—creates and terminates connections, breaks up packets into frames and transmits them from source to destination.
  • Layer 3—Network Layer—breaks up segments into network packets, and reassembles them upon receipt, and routes packets using an optimal path on the physical network.
  • Layer 4—Transport Layer—responsible for reassembling the segments on the receiving end, turning it into data that can be used by the session layer.
  • Layer 5—Session Layer—creates communication channels, called sessions, between devices. Keeps sessions open during data transfer and closing them when it ends.
  • Layer 6—Presentation Layer—prepares data for the application layer, defining how two devices should encode, encrypt, and compress data to ensure it is received correctly.
  • Layer 7—Application Layer—used by end-user software like web browsers and email clients. Sends and receives information that is meaningful for end-users using protocols like HTTP, FTP, and DNS.

6 Types of Network Security Protocols

Following are some of the most common network security protocols. They are arranged by the network layer at which they operate, from bottom to top.

Internet Protocol Security (IPsec) Protocol—OSI Layer 3

IPsec is a protocol and algorithm suite that secures data transferred over public networks like the Internet. The Internet Engineering Task Force (IETF) released the IPsec protocols in the 1990s. They encrypt and authenticate network packets to provide IP layer security. 

IPsec originally contained the ESP and AH protocols. Encapsulating Security Payload (ESP) encrypts data and provides authentication, while Authentication Header (AH) offers anti-replay capabilities and protects data integrity. The suite has since expanded to include the Internet Key Exchange (IKE) protocol, which provides shared keys establishing security associations (SAs). These enable encryption and decryption via a firewall or router. 

IPsec can protect sensitive data and VPNs, providing tunneling to encrypt data transfers. It can encrypt data at the application layer and enables authentication without encryption.

SSL and TLS—OSI Layer 5

The Secure Sockets Layer (SSL) protocol encrypts data, authenticates data origins, and ensures message integrity. It uses X.509 certificates for client and server authentication. SSL authenticates the server with a handshake, negotiating security session parameters and generating session keys. It can then securely transmit the data by authenticating its origin.

SSL sessions use cryptographic algorithms similar to the algorithms used by the client and server (determined during the handshake). Servers may support encryption with algorithms like AES and Triple DES. 

X.509 server certificates are a requirement for SSL, enabling the client to validate the server. SSL can also use X.509 client certificates for authentication. These certificates must be signed by a trusted certificate authority in the server’s keyring. 

Transport Layer Security (TLS) is an SSL-based protocol defined by the IETF (SSL is not).

Datagram Transport Layer Security (DTLS)—OSI Layer 5

DTLS is a datagram communication security protocol based on TLS. It does not guarantee message delivery or that messages arrive in order. DTLS introduces the advantages of datagram protocols, including lower latency and reduced overhead.

Kerberos Protocol—OSI Layer 7

Kerberos is a service request authentication protocol for untrusted networks like the public Internet. It authenticates requests between trusted hosts, offering built-in Windows, Mac, and Linux operating system support. 

Windows uses Kerberos as its default authentication protocol and a key component of services like Active Directory (AD). Broadband service providers use it to authenticate set-top boxes and cable modems accessing their networks.

Systems, services, and users, only need to trust the KDC when using Kerberos. KDC offers authentication and grants tickets to enable nodes to authenticate each other. Kerberos uses shared secret cryptography to authenticate packets and protect them during transmission. 

Simple Network Management Protocol (SNMP)—OSI Layer 7

SNMP is a network device management and monitoring protocol that works at the application layer. It can secure devices on LANs or WANs. SNMP provides a shared language to allow devices like servers and routers to communicate via a network management system. SNMP is an original part of the Internet protocol suite defined by the IETF. 

Components of the SNMP architecture include a manager, an agent, and a management information base (MIB). The manager is the client, the agent is the server, and the MIB is the database. The SNMP agent responds to the manager’s requests using the MIB. While SNMP is widely available, administrators must adjust the default settings to enable communication between the agents and the network management system to implement the protocol. 

With the introduction of SNMPv3 in in 2004, the SNMP protocol gained three important security features: encryption of packets to prevent eavesdropping, integrity checks to ensure packets were not been tampered in transit, and authentication to verify that communications come from a known source.

HTTP and HTTPS—OSI Layer 7

HTTP is an application protocol that specifies rules for web file transfers. Users indirectly use HTTP when they open their web browser. It runs on top of the Internet protocol suite. 

HTTPS is the secure version of HTTP, securing the communication between browsers and websites. It helps prevent DNS spoofing and man-in-the-middle attacks, which is important for websites that transmit or receive sensitive information. All websites requiring user logins or handling financial transactions are attractive data theft targets and should be using HTTPS.

HTTPS runs over the SSL or TLS protocol using public keys to enable shared data encryption. HTTP uses port 80 by default, while HTTPS uses port 443 for secure transfers. With HTTPS, the server and browser must establish the communication parameters before initiating data transfers.

Security Protocols naming cryptographic or encryption protocols help protect sensitive data, financial data, and file transfer using the cryptographic method.

The protocol shows how the algorithm works and gives details like data structure, and data representation.

Security protocols can apply secure multi-party computation, secret sharing process, entity authentication, Non-repudiation method, and encryption method.

Such protocols ensure the data delivery in a secure way between two ends.

What is a secure data exchange protocol providing privacy between to Internet application and authentication of server?

Below we have discussed few security protocols to protect online information.

SSL and TLS (HTTPS):

SSL and TLS are separate protocols; however, TLS is a successor version of SSL. After SSL v3.0, TLS came into focus, and at present, TLS 1.3 is in practice by certificate authorities. Still, we know the TLS protocol with an SSL certificate.

1. SSL Protocol:

SSL protocol (Secure Socket Layer) offers data encryption, integrity, and authentication that flows between the server and the client. The protocol offers server and client authentication.

During SSL handshake to create a secure connection, session keys (public and private key) are swapped, and algorithms are agreed upon.

SSL certificates signed by a certificate authority should be compatible with almost all servers, operating systems, and browsers to avoid SSL warnings.

2. TLS Protocol:

TLS (Transport Layer Security) 1.1 was released in 2006 after two years in 2008, TLS 1.2 replaced it.

However, TLS 1.3 is used by many certificate authorities and came into play in 2018. Foremost browser authorities and search engines have already started to use TLS 1.2 and TLS 1.3 from January 2020

VPN:

VPN (Virtual Private Network) creates a secure and private network while hiding an IP address to cover actual identity. VPN offers an encrypted connection, which is strong compared to a secure Wi-Fi hotspot. While surfing on insecure Wi-Fi, an attacker can steal login credentials and other private information. In that case, you need a VPN that keeps your connection anonymous. VPN offers the freedom to access a website and app in a secure environment using a secure tunnel between a local network and an exit point in another location.

Recommended: VPN Security Flaws And Its Prevention

SFTP:

SFTP (Secure File Transfer Protocol) is an upgraded version of FTP (File Transfer Protocol) in which the files were transferred in an unencrypted manner. SFTP removes this issue and offers a secure environment for file transfer on both local and remote servers. SFTP uses a secure SSH protocol to establish a connection. SFTP helps to protect against MiTM and password sniffing attacks. With cryptographic hash function and data encryption, SSH protects data integrity.

SSH:

SSH (Secure Shell) is a cryptographic protocol for carrying out network services in a secured environment over an insecure network. Over SSH protocol, each command, file transfer, and output are encrypted to protect against network attacks. It connects a client-server application to an SSH server. SSH works on TCP port#22 and generally used on Unix and Windows systems.

Recommended: SSH Vs. SSL- What are the differences and similarities

OSPF:

Open Shortest Path First (OSPF) is a routing protocol that creates a route between the origin and the target router. The IETF (Internet Engineering Task Force) has developed OSPF protocol as an interior gateway protocol. It works on port 89 as a network layer protocol.

Firewall:

Firewall is a renowned technology that is used to protect online information. In E-commerce, firewall is used to protect E-commerce components such as Internet Payment Gateway, Server Based Wallet, and Payment Server.

Most firewalls can be divided into three categories:

  • Packet filter (without memory);
  • Filter circuit level;
  • Application-layer filters.

Packet filtering blocks or passes data packets as they pass through a network interface,which include IP-address and port numbers and destination.This type of firewall is the easiest to implement and maintain, and almost no effect on network performance but its protection level is very low.

Filter Circuit level is an intermediate between the packet filter and application layer. Filter circuit-level monitors handshake (handshake) between the authorized client and the external host that determines whether the requested session is valid.Information delivered to a remote computer over a circuit level gateway seems to have originated from the gateway; such it hides the information on protected networks. Such circuit level is inexpensive and suitable for protecting private network. It does not filter individual packets.

Application-level filters provide a high degree of protection, but it is expensive and can increase complexity. Such filters are implemented as a dedicated firewall. The server application is located on a private network behind a firewall. In fact, the client cannot find the application proxy (proxy application server) with the firewall. In contrast to the filter circuit level, application-level intermediaries allow only packets that they were assigned to work. Application-level intermediaries check the contents of each packet passing through the gateway.

IPSec:

It encrypts data at the network level that consists of three protocols: Authentication Header, Encapsulating Secure Payload (ESP), and Internet Key Exchange (IKE).

  • The Authentication Header provides data origin authentication, data integrity, and protection from the burden of repeated messages. The AH protocol authenticates every packet, which makes ineffective the program, and tries to seize control of the session.
  • ESP offers validation and integrity for the payload and not for the IP header.ESP protocol provides encryption of data streams. It uses SHA and MD5 standard algorithms.
  • IKE protocol solves the problem of key distribution protocol based on Diffie-Hellman. It establishes security association (SA) in the IPsec. It uses DNS and a Diffie-Hellman key exchange to establish a shared secret session.

IPSec has spread in two main configurations. First configuration carries Network Layer Protocol that uses for data transfer between gateways for local networks that support IPv4 for unencrypted transmission of network. Second configuration is for closing the data within the network, for that all the jobs and the web server must support the protocol IPSec. Today, most modern operating systems (Windows 2000, Linux, and Solaris) protocol supports IPSec.

PCT:

If we talk about PCT (Private Communication Technology), it works same as SSL. The main difference between PCT and SSL is the message size. PCT has a smaller set of message compared to SSL.PCT supports algorithms RSA, Diffie-Hellman, Fortezza key management; DES, RC2 and RC4 – data encryption; DSA and RSA – for digital signature.PCT is implemented in Microsoft Internet Explorer version 3 and above, as well as Microsoft Internet Information Server version 2 and above. PCT has more options in the negotiation of an algorithm and data formats. While authenticating and encrypting the message, it requires two separate key in PCT. However, in SSL both need a single key.

As you can see

There are emerging risks for online threats and server vulnerability that can damage your network or can steal your data. Either firewall, HTTPS, or IPSec warn about possible violations of security. However, PCT has been replaced by SSLv3 and TLS (Transport Layer Security). Today if we see, SSLv3 is the best security used for server, network, and browser security and many organizations, institutes and corporate have started to adopt SSL technology. Even social media and giant search engines have taken a step in the direction of protecting their business with SSL.