SlideShare a Scribd company logo
TRANSPORT LAYER
SECURITY
B. SOUNDARYA M.SC (CS),
NADAR SARAWATHI
COLLEGE OF ARTS AND
SCIENCE, THENI.
WHAT IS TRANSPORT
LAYER SECURIY?
TLS is the successor to the
secure sockets layer.
Transport layer security is a
protocol that ensure privacy
between communicating
application and their users
on the internet.
WHY DO WE NEED IT?
TLS ensure that no
third party may eaves
drop or tamper with any
message.
BENEFITS OF TLS
Encryption
Algorithm flexibility
Inter operability
Ease of deployment
WORKING OF TRANSPORT
LAYER SECURITY
The client connect to server using
tcp, the client can be anything .
The client sends a number of
specifications ,
1) Version of ssl, tls.
2) Which cipher suites, compression
method it wants to use.
The server checks what the
highest ssl, tls variation it
that is supported by them
both, picks a cipher suits
form one of the clients
options and optionally picks a
compression methods.
HOW TO DETECT SECURE
CONNECTIONS
Chrome can display the version.
Click on the padlock icon a popup
appears, which contains some
details , including the protocol
version .
Example:
The connection uses tls 1.0”
verified on version 21.01180.82
EXAMPLES
The site identity is verified and is
secure.
Maharashtra.gov.in users
#ssl
# The certificate has been
verified by thawte ssl ca
# The key exchanging
mechanism.
TLS RECORD PROTOCOL
 Dividing outgoing messages into
manageable blocks, and
reassembling income messages.
 Compressing outgoing blocks and
decompressing income blocks.
 Applying a message authentication
code to outgoing message and
verifying incoming messages using
the Mac.
 Encrypting outgoing messages and
decrypting income messages.
 When the record protocol and
handshake protocols are completed,
the outgoing encrypted data is
passed down to the Transmission
control protocol layer for transport.
THANK
YOU !!!

More Related Content

What's hot

SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
Sirish Kumar
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
Mrinal Wadhwa
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
Hrudya Balachandran
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
Maarten Smeets
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Pina Parmar
 
Industry Best Practices for SSH Access
Industry Best Practices for SSH AccessIndustry Best Practices for SSH Access
Industry Best Practices for SSH Access
DevOps.com
 
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution ProtocolsProvably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Avinash Varma Kalidindi
 
SSL/TLS
SSL/TLSSSL/TLS
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
Raghavendra Rao
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
Sandeep Gupta
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
Amar Shah
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
Ghanshyam Patel
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
SSL
SSLSSL
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
Security
SecuritySecurity
Security
Jernej Virag
 
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
Vishal Kumar
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 

What's hot (20)

SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Industry Best Practices for SSH Access
Industry Best Practices for SSH AccessIndustry Best Practices for SSH Access
Industry Best Practices for SSH Access
 
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution ProtocolsProvably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
SSL
SSLSSL
SSL
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 
Security
SecuritySecurity
Security
 
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 

Similar to CN

Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
csandit
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
cscpconf
 
Unit 6
Unit 6Unit 6
SSL VS TLS.pptx
SSL VS TLS.pptxSSL VS TLS.pptx
SSL VS TLS.pptx
Vignesh kumar
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Sanjeev Kumar Jaiswal
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
SSL.pptx
SSL.pptxSSL.pptx
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
CSCJournals
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
 
transportlayersecuritytls-150801104256-lva1-app6892.pdf
transportlayersecuritytls-150801104256-lva1-app6892.pdftransportlayersecuritytls-150801104256-lva1-app6892.pdf
transportlayersecuritytls-150801104256-lva1-app6892.pdf
pjeraids
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Emprovise
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
Study and analysis of some known attacks on transport layer security
Study and analysis of some known attacks on transport layer securityStudy and analysis of some known attacks on transport layer security
Study and analysis of some known attacks on transport layer security
Nazmul Hossain Rakib
 
Differences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdfDifferences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdf
Host It Smart
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
Dr. Shivashankar
 
Ssl https
Ssl httpsSsl https
Ssl https
Andrada Boldis
 
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
jeetendra mandal
 
Security issues in cloud
Security issues in cloudSecurity issues in cloud
Security issues in cloud
Wipro
 

Similar to CN (20)

Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Unit 6
Unit 6Unit 6
Unit 6
 
SSL VS TLS.pptx
SSL VS TLS.pptxSSL VS TLS.pptx
SSL VS TLS.pptx
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Web Security
Web SecurityWeb Security
Web Security
 
SSL.pptx
SSL.pptxSSL.pptx
SSL.pptx
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
transportlayersecuritytls-150801104256-lva1-app6892.pdf
transportlayersecuritytls-150801104256-lva1-app6892.pdftransportlayersecuritytls-150801104256-lva1-app6892.pdf
transportlayersecuritytls-150801104256-lva1-app6892.pdf
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Study and analysis of some known attacks on transport layer security
Study and analysis of some known attacks on transport layer securityStudy and analysis of some known attacks on transport layer security
Study and analysis of some known attacks on transport layer security
 
Differences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdfDifferences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdf
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 
Ssl https
Ssl httpsSsl https
Ssl https
 
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
 
Security issues in cloud
Security issues in cloudSecurity issues in cloud
Security issues in cloud
 

More from sowfi

Lavanya m.sc
Lavanya m.scLavanya m.sc
Lavanya m.sc
sowfi
 
Lavanya m.sc
Lavanya m.scLavanya m.sc
Lavanya m.sc
sowfi
 
Soundarya m.sc
Soundarya m.scSoundarya m.sc
Soundarya m.sc
sowfi
 
Software engineering 2
Software engineering 2Software engineering 2
Software engineering 2
sowfi
 
Compiler design
Compiler designCompiler design
Compiler design
sowfi
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
sowfi
 
Web programming
Web programmingWeb programming
Web programming
sowfi
 
OS
OSOS
OS
sowfi
 
OS
OSOS
OS
sowfi
 
RDBMS
RDBMSRDBMS
RDBMS
sowfi
 
DM
DMDM
DM
sowfi
 
CN
CNCN
CN
sowfi
 
Dm
DmDm
Dm
sowfi
 
RDBMS
RDBMSRDBMS
RDBMS
sowfi
 
connected compounds
connected compoundsconnected compounds
connected compounds
sowfi
 
GENETIC ALGORITHM
GENETIC ALGORITHMGENETIC ALGORITHM
GENETIC ALGORITHM
sowfi
 
JDBE
JDBEJDBE
JDBE
sowfi
 
AUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATORAUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATOR
sowfi
 
single source shorest path
single source shorest pathsingle source shorest path
single source shorest path
sowfi
 
servlet in java
servlet in javaservlet in java
servlet in java
sowfi
 

More from sowfi (20)

Lavanya m.sc
Lavanya m.scLavanya m.sc
Lavanya m.sc
 
Lavanya m.sc
Lavanya m.scLavanya m.sc
Lavanya m.sc
 
Soundarya m.sc
Soundarya m.scSoundarya m.sc
Soundarya m.sc
 
Software engineering 2
Software engineering 2Software engineering 2
Software engineering 2
 
Compiler design
Compiler designCompiler design
Compiler design
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Web programming
Web programmingWeb programming
Web programming
 
OS
OSOS
OS
 
OS
OSOS
OS
 
RDBMS
RDBMSRDBMS
RDBMS
 
DM
DMDM
DM
 
CN
CNCN
CN
 
Dm
DmDm
Dm
 
RDBMS
RDBMSRDBMS
RDBMS
 
connected compounds
connected compoundsconnected compounds
connected compounds
 
GENETIC ALGORITHM
GENETIC ALGORITHMGENETIC ALGORITHM
GENETIC ALGORITHM
 
JDBE
JDBEJDBE
JDBE
 
AUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATORAUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATOR
 
single source shorest path
single source shorest pathsingle source shorest path
single source shorest path
 
servlet in java
servlet in javaservlet in java
servlet in java
 

Recently uploaded

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

CN

  • 1. TRANSPORT LAYER SECURITY B. SOUNDARYA M.SC (CS), NADAR SARAWATHI COLLEGE OF ARTS AND SCIENCE, THENI.
  • 2. WHAT IS TRANSPORT LAYER SECURIY? TLS is the successor to the secure sockets layer. Transport layer security is a protocol that ensure privacy between communicating application and their users on the internet.
  • 3. WHY DO WE NEED IT? TLS ensure that no third party may eaves drop or tamper with any message.
  • 4. BENEFITS OF TLS Encryption Algorithm flexibility Inter operability Ease of deployment
  • 5. WORKING OF TRANSPORT LAYER SECURITY The client connect to server using tcp, the client can be anything . The client sends a number of specifications , 1) Version of ssl, tls. 2) Which cipher suites, compression method it wants to use.
  • 6. The server checks what the highest ssl, tls variation it that is supported by them both, picks a cipher suits form one of the clients options and optionally picks a compression methods.
  • 7. HOW TO DETECT SECURE CONNECTIONS Chrome can display the version. Click on the padlock icon a popup appears, which contains some details , including the protocol version . Example: The connection uses tls 1.0” verified on version 21.01180.82
  • 8. EXAMPLES The site identity is verified and is secure. Maharashtra.gov.in users #ssl # The certificate has been verified by thawte ssl ca # The key exchanging mechanism.
  • 9. TLS RECORD PROTOCOL  Dividing outgoing messages into manageable blocks, and reassembling income messages.  Compressing outgoing blocks and decompressing income blocks.  Applying a message authentication code to outgoing message and verifying incoming messages using the Mac.
  • 10.  Encrypting outgoing messages and decrypting income messages.  When the record protocol and handshake protocols are completed, the outgoing encrypted data is passed down to the Transmission control protocol layer for transport.