2. • It is an Internet protocol for secure exchange of
information between a web browser and a web
server
• It provides
▫ Authentication
▫ Confidentiality
• Developed by Netscape Corporation in 1994
• Currently comes in three versions : 2, 3 and 3.1
2
14. • Identifies highest version of SSL that client can supportVersion
• 32 bit date time field
• 28 byte random number
Random
• Variable length session identifier
• Can be zero (new session) or non zero (connection exists)
Session id
• Contains list of cryptographic algorithms supported by the
clientCipher suite
• Contains list of compression algorithms supported by the
client
Compression
method
14
15. • Identifies lower of version suggested by client and
highest supported by serverVersion
• Same structure as that in client hello
• Random value independent of client’s value
Random
• Uses same value if client sends non zero value
• Otherwise creates new session id
Session id
• Contains single cipher suite which server selects from
the list sent by clientCipher suite
• Contains single compression algorithm which server
selects from the list sent by client
Compression
method
15
17. 17
• Server sends its Digital certificate
• Helps the to authenticateCertificate
• Sent only if the certificate does not contain enough information
to complete the key exchange
Server key
exchange
• Sent if the client needs to authenticate itself
Certificate
request
• Sent to indicate that the server is finished its part of the key
exchange
• after sending this message the server waits for client response
Server
hello done
19. 19
• will send a certificate message or a no certificate alertCertificate
• always sent
• RSA encrypted pre-master secret
Client key
exchange
• sent only if the client sent a certificate
• provides client authentication
• contains signed hash of all the previous handshake
messages
Certificate
verify
23. • Provide two services for SSL connections:
Confidentiality: by encrypting application data.
Message Integrity: by computing MAC over the
compressed data.
• Can be utilized by some upper-layer protocols
of SSL.
31. 31
Authentication of server
– How does client know who they are dealing with?
Information integrity
– How do we know third party has not altered data en
route?
Bob’s web
siteAlice thinks she is at Bob’s site, but Darth is
spoofing it
Bob’s web
siteAddress information
Change so item shipped to Darth
32. 32
There are several versions of the SSL protocol
defined. The latest version, the Transport
Layer Security Protocol (TLS), is based on
SSL 3.0
SSL Version 1.0
SSL Version 2.0
SSL Version 3.0
TLS Version 1.0
TLS Version 1.0 with SSL Version 3.0