“Secure Socket Layer”
Project Presentation by:


    Dwiti Gajab




    Mihir Trivedi




    Aman Chaurasia




05/26/12                             1
Contents:
    Cryptography and Secure Socket Layer
    (SSL)

   Establishment of Secured connection for “Encryption”

   Briefing on Asymmetric Encryption algorithms




05/26/12                                                   2
Cryptography:
              Security and Integrity

              Encryption helps in achieving this.

              SSL is one such type of protocols. Its two main
               functions are:

              Encryption

              Identification

05/26/12                                                         3
Why SSL exists?




05/26/12             4
SSL Architecture:




05/26/12               5
Few terms:
   Certificate:
- It is used to authenticate the website.
- Issued by Certificate Authority (CA).
- Mainly contains:
          Public Key

          Digital Signature



    Hashing:
     - It is a process that compresses text to a single number.
     - Used in a certificate and in SSL handshaking.

    05/26/12                                                      6
Data Transfer:
   Asymmetric Data Transfer
    - Used in handshaking
    - Two Keys are involved:
         Public Key: It is used to encrypt.
         Private Key: It is used to decrypt.


   Symmetric Data Transfer
          Used in application data transfer.
          Same key is used in encryption & decryption.


05/26/12                                                  7
SSL Handshaking:




05/26/12              8
Encryption Algorithms:
   Computers agree how to encrypt !


                  A                                        B

    Key           Cipher        Hash          Key           Cipher        Hash


                                              RSA            DES        HAC- MD5
    RSA            DES        HAC- MD5

Diffie Hellman   Triple DES   HMAC- SHA   Diffie Hellman   Triple DES   HMAC- SHA
                   AES                                       AES
                   RC4                                       RC4




 05/26/12                                                                           9
05/26/12   10
05/26/12   11
05/26/12   12
05/26/12   13
05/26/12   14
Asymmetric Key Cryptography:
   Diffi Hellman algorithm
   Rivest, Shamir and Adleman (RSA) algorithm




    05/26/12                                     15
Symmetric key Cryptography:
   Used for encryption of data.

   Substitution/Transposition/Simple round ciphers.

   Modern round ciphers: DES, Triple DES, AES




    05/26/12                                           16
Future Scope:
   Development of RSA algorithm for better security.


    References:
   Data communication and Networking, 4E, by Behrouz A.
    Forouzan
   Computer Networks by Ross & Kurose
   Network Security IOS by CISCO.
   http://en.wikipedia.org/wiki/Secure_Sockets_Layer
   http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html

05/26/12                                                17
Any Questions???

           Thank You…




05/26/12                      18

Secure Socket Layer

  • 1.
    “Secure Socket Layer” ProjectPresentation by:  Dwiti Gajab  Mihir Trivedi  Aman Chaurasia 05/26/12 1
  • 2.
    Contents:  Cryptography and Secure Socket Layer (SSL)  Establishment of Secured connection for “Encryption”  Briefing on Asymmetric Encryption algorithms 05/26/12 2
  • 3.
    Cryptography:  Security and Integrity  Encryption helps in achieving this.  SSL is one such type of protocols. Its two main functions are:  Encryption  Identification 05/26/12 3
  • 4.
  • 5.
  • 6.
    Few terms:  Certificate: - It is used to authenticate the website. - Issued by Certificate Authority (CA). - Mainly contains:  Public Key  Digital Signature  Hashing: - It is a process that compresses text to a single number. - Used in a certificate and in SSL handshaking. 05/26/12 6
  • 7.
    Data Transfer:  Asymmetric Data Transfer - Used in handshaking - Two Keys are involved:  Public Key: It is used to encrypt.  Private Key: It is used to decrypt.  Symmetric Data Transfer  Used in application data transfer.  Same key is used in encryption & decryption. 05/26/12 7
  • 8.
  • 9.
    Encryption Algorithms: Computers agree how to encrypt ! A B Key Cipher Hash Key Cipher Hash RSA DES HAC- MD5 RSA DES HAC- MD5 Diffie Hellman Triple DES HMAC- SHA Diffie Hellman Triple DES HMAC- SHA AES AES RC4 RC4 05/26/12 9
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
    Asymmetric Key Cryptography:  Diffi Hellman algorithm  Rivest, Shamir and Adleman (RSA) algorithm 05/26/12 15
  • 16.
    Symmetric key Cryptography:  Used for encryption of data.  Substitution/Transposition/Simple round ciphers.  Modern round ciphers: DES, Triple DES, AES 05/26/12 16
  • 17.
    Future Scope:  Development of RSA algorithm for better security. References:  Data communication and Networking, 4E, by Behrouz A. Forouzan  Computer Networks by Ross & Kurose  Network Security IOS by CISCO.  http://en.wikipedia.org/wiki/Secure_Sockets_Layer  http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html 05/26/12 17
  • 18.
    Any Questions??? Thank You… 05/26/12 18