Secure Socket Layer (SSL)

3,291 views

Published on

The project focused on data encryption using asymmetric algorithm RSA.

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,291
On SlideShare
0
From Embeds
0
Number of Embeds
41
Actions
Shares
0
Downloads
145
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Secure Socket Layer (SSL)

  1. 1. “ Secure Socket Layer” <ul><li>Project Presentation by: </li></ul><ul><li>Dwiti Gajab </li></ul><ul><li>Mihir Trivedi </li></ul><ul><li>Aman Chaurasia </li></ul>
  2. 2. Contents: <ul><li>Cryptography and Secure Socket Layer </li></ul><ul><li>(SSL) </li></ul><ul><li>Establishment of Secured connection for “Encryption” </li></ul><ul><li>Briefing on Asymmetric Encryption algorithms </li></ul>
  3. 3. Cryptography: <ul><li>Security and Integrity </li></ul><ul><li>Encryption helps in achieving this. </li></ul><ul><li>SSL is one such type of protocols. Its two main functions are: </li></ul><ul><li>Encryption </li></ul><ul><li>Identification </li></ul>
  4. 4. Why SSL exists?
  5. 5. SSL Architecture:
  6. 6. Few terms: <ul><li>Certificate: </li></ul><ul><li>- It is used to authenticate the website. </li></ul><ul><li>- Issued by Certificate Authority (CA). </li></ul><ul><li>- Mainly contains: </li></ul><ul><ul><ul><li>Public Key </li></ul></ul></ul><ul><ul><ul><li>Digital Signature </li></ul></ul></ul><ul><li> </li></ul><ul><li>Hashing: </li></ul><ul><li>- It is a process that compresses text to a single number. </li></ul><ul><li>- Used in a certificate and in SSL handshaking. </li></ul>
  7. 7. Data Transfer: <ul><li>Asymmetric Data Transfer </li></ul><ul><li>- Used in handshaking </li></ul><ul><li>- Two Keys are involved: </li></ul><ul><ul><ul><li>Public Key: It is used to encrypt. </li></ul></ul></ul><ul><ul><ul><li>Private Key: It is used to decrypt. </li></ul></ul></ul><ul><li>Symmetric Data Transfer </li></ul><ul><ul><li>Used in application data transfer. </li></ul></ul><ul><ul><li>Same key is used in encryption & decryption. </li></ul></ul>
  8. 8. SSL Handshaking:
  9. 9. Encryption Algorithms: A B Computers agree how to encrypt !   RC4     AES   HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA       Hash Cipher Key   RC4     AES   HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA       Hash Cipher Key
  10. 15. Asymmetric Key Cryptography: <ul><li>Diffi Hellman algorithm </li></ul><ul><li>Rivest, Shamir and Adleman (RSA) algorithm </li></ul>
  11. 16. Symmetric key Cryptography: <ul><li>Used for encryption of data. </li></ul><ul><li>Substitution/Transposition/Simple round ciphers. </li></ul><ul><li>Modern round ciphers: DES, Triple DES, AES </li></ul>
  12. 17. Future Scope: <ul><li>Development of RSA algorithm for better security. </li></ul><ul><li>References: </li></ul><ul><li>Data communication and Networking, 4E, by Behrouz A. Forouzan </li></ul><ul><li>Computer Networks by Ross & Kurose </li></ul><ul><li>Network Security IOS by CISCO. </li></ul><ul><li>http:// en.wikipedia.org/wiki/Secure_Sockets_Layer </li></ul><ul><li>http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html </li></ul>
  13. 18. <ul><li>Any Questions??? </li></ul><ul><li>Thank You… </li></ul>

×