• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Transport Layer Security

Transport Layer Security






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • The first difference is the version number (major and minor). The current version of SSL is 3.0; the current version of TLS is 1.0. In other words, SSLv3.0 is compatible with TLSv1.0.Another minor difference between SSL and TLS is the lack of support for the Fortezza method. TLS does not support Fortezza for key exchange or for encryption/decryption. “standardized” by IETF RFC2246.
  • End-to-end between a client and server – Sits on top of TCP – Requires reliable connectionMost important Internet crypto protocol? – Secure web pages – E-mail and LDAP access control
  • Handshake: Responsible for negotiating security, authenticating the server to the browser, and (optionally) defining other communication parameters.Data exchange (record) protocol uses the secret key to encrypt the data for secrecy and to encrypt the message digest for integrity.Phase 1 : Client sideversion, client random number, session id , compression method Server sideVersion, server random number, session, selected compression methodAfter Phase I, the client and server know the following:The version of SSL❏ The algorithms for key exchange, message authentication, and encryption❏ The compression method❏ The two random numbers for key generationPhase 2: After Phase II,❏ The server is authenticated to the client.❏ The client knows the public key of the server if required.Server sends a certificate message that includes the public key of the server. The public key is certified by some certification authority, which means that the public key is encrypted by a CA private key. Browser has a list of CAs and their public keys. It uses the corresponding key to decrypt the certification and finds the server public key. This also authenticates the server because the public key is certified by the CA.Phase 3: After Phase III,❏ The client is authenticated for the server.❏ Both the client and the server know the pre-master secret.Browser sends a secret key, encrypts it with the server public key, and sends it to the server.Phase 4:After Phase IV, the client and server are ready to exchange data.Browser sends a message, encrypted by the secret key, to inform the server that handshaking is terminating from the browser key.Server decrypts the secret key using it private key and decrypts the message using the secret key. It then sends a message, encrypted by the secret key, to inform the browser that handshaking is terminating from the server side.
  • TLS supports all of the alerts defined in SSL except for NoCertificate. TLS also adds some new ones to the list. Table shows the full list of alerts supported by TLS.

Transport Layer Security Transport Layer Security Presentation Transcript

  • Presentation on : Transport Layer Security (TLS) Presented by : Chhatra Thapa
  • Two protocols are dominant today for providingsecurity at the transport layer Secure Sockets Layer (SSL) protocol Transport Layer Security (TLS) protocol
  • Definition: Transport Layer Security (TLS) was designed to provide security at the transport layer. TLS was derived from a security protocol called Secure Sockets Layer (SSL).
  • Location of SSL and TSL in the Internet mode
  • TLS layers : Four TLS protocol
  • 1. Handshake protocol
  • Hash for Certificate Verify message in TLS
  • Hash for Finished message in TLS
  • 2. Change Cipher Spec Protocol
  • 3. Alert protocol
  • 4. Record protocol