SlideShare a Scribd company logo
BABA GHULAM SHAH BADSHAH UNIVERSITY RAJOURI
Department of Computer Science and Applications
ROLL NO. 19-MCS-2015
Semester:- 5th
Course Title:- Cryptography And Network Security.
Presentation Topic:- Secure Sockets Layer (SSL)
1
WHAT IS SSL?
 SSL (Secure Sockets Layer) is a standard security
protocol for establishing encrypted links between a
web server and a browser in an online
communication.
 The usage of SSL technology ensures that all data
transmitted between the web server and browser
remains encrypted.
2
WHAT IS SSL?
 it provides a secure transport connection between
applications (e.g., a web server and a browser).
 SSL was developed by Netscape.
 SSL version 3.0 has been implemented in many web
browsers (e.g., Netscape Navigator and MS Internet
Explorer) and web servers and widely used on the
Internet.
 TLS can be viewed as SSL v3.1
3
Cont…
 This link ensures that all data passed between the
web server and browsers remain private and integral.
 It provide two basic security services
1) Authentication.
2) Confidentiality.
 It provide a secure pipeline between the web browser
and web server.
4
Cont...
 SSL provides users with a secure communication
channel for communication purpose between the
client and the server.
 It encrypt data packet at the sender’s end.
 When these data packet arrive at the destination
system, they decrypt to retrieve the original data.
 In short, SSL encrypt data at the sender’s end and
decrypt data at the receiver’s end.
5
Need of SSL
6
SSL HISTORY
 Netscape developed The Secure Sockets Layer
Protocol (SSL) in 1994, as a response to the growing
concern over security on the Internet.
 SSL was originally developed for securing web
browser and server communications.
7
SSL VERSION
 There are several versions of the SSL protocol defined.
 SSL Version
 SSL Version 1.0
 SSL Version 2.0
 SSL Version 3.0
 TLS Version 1.0
 TLS Version 1.0 with SSL Version 3.0 compatibility
8
Cont…
 The latest version, the Transport Layer Security
Protocol (TLS), is based on SSL 3.0
 Version 1.0 was never publicly released;
 version 2.0 was released in February 1995 but
"contained a number of security flaws which
ultimately led to the design of SSL version 3.0"
9
Position of SSL in TCP/IP
Application Layer
SSL Layer
Transport Layer
Internet Layer
Data Link Layer
Physical Layer
Fig. Position of SSL in
TCP/IP
• SSL can be conceptually
considered as an
additional layer in the
TCP/IP protocol suite.
• The SSL layer is located
between the application
layer and the transport
layer, as shown in Figure
10
L5 Data
L5 Data
L5 Data
L4 Data
L3 Data
0101010100010101010010
SH
H4
H2
H3
L5 Data
L5 Data
L5 Data
L4 Data
L3 Data
0101010100010101010010
SH
H4
H2
H3
Application
SSL
Transport
Internet
Data Link
Physical
Fig. SSL is located between application and transport layer
Transmission Medium
Cont…
X Y
11
How SSL Works?
 SSL has three sub-protocols, namely:
 The Handshake Protocol,
 The Record Protocol and
 The Alert Protocol.
12
Handshaking Protocol
 Protocol-allows server
and client to
authenticate negotiate
encryption algorithm
and cryptographic keys
Type Length Contents
Fig. Format of handshake protocol
message
1 byte 3 bytes 1 or more bytes
Indicate one of the ten
possible message types
Length of Message in
byte
Contain parameters
associated with the
message
13
Handshaking made up of Four Phases
14
Phase 1. Establishing Security Capabilities
Fig. Phase 1. Establishing Security Capabilities
• The first phase of SSL
handshake is used to
initiate a logical
connection and establish
the security capabilities
associated with that
connection
• This consists of two
message Client hello
and Server hello.
15
Phase 2 :-Server Authentication and key
exchange
 The server initiates this second phase of the SSL
handshake, and is the sole sender of all the messages
in the phase.
 The client is the sole recipient of all these message.
 This phase contain the four steps.
16
Phase 2. Server Authentication and key
exchange
Step 1. Certificates
Step 4. Server Hello done
Step 2. Server key exchange
Step 3. Certificate request
Web
Browse
r
Web
Server
17
Phase 3. Client Authentication and key exchange
Step 1. Certificate
Step 2. Client key exchange
Step 3. Certificate verify
Web
Browse
r
Web
Server
18
Phase 4. Finish
Step 1. Change of cipher
Step 2. Finish
Step 3 Change cipher specs
Step 4. Finish
Web
Server
Web
Browse
r
19
Record Protocol
 The record protocol came into picture after the
successful handshake is completed between client
and server.
 This protocol provides two services
1) Confidentiality:- This can be achieve by using
secret key that is defined by the handshake protocol
2) Integrity:- Handshake protocol also defines a
shared secret key that is used for assuring message
integrity.
20
Record Protocol
1. fragmentation. Each upper-layer
message is fragmented into blocks of 214
bytes (16384 bytes) or less.
2. Compression:- The fragmented
blocks are optionally compressed. The
compression process must not result into
the loss of data
3. Add MAC:- using the shared secret key
the message authentication code for
each block is calculated.
4. Encryption:- using the symmetric key
established previously in the handshake
protocol, the output of previous step is now
encrypted. This may not increases the overall
size of block.
5. Append Header:- Finally a header is
added to encrypted block.
21
Alert Protocol
 When client or server detects an error,
the detecting party sends an alert
message to the other party.
 If the error is fatal, both the parties
immediately close the SSL connection
 Other error, which are not serve, do not
result in the termination of the
connection.
Severity Cause
Byte 1
Byte
2
Fig. Alert Protocol
message format
• Each alert message consist of 2
bytes.
. If error is fatal, byte
contain 2.
Fist byte signifies the type of error.
If it is warning, this byte contain
1
22
Fatal alerts
Fatal alerts
 Unexpected message: An inappropriate message was received.
 Bad_record_mac: An incorrect MAC was received.
 Decompression_failure: function rerieved an improper input
 Handshake_failure:
23
No Fatal Alert/ Warning
No Fatal Alert/ Warning
• no_certificate:
• bad_certificate: received certificate was corrupt
• unsupported_certificate: The type of the received certificate is
not supported.
• certificate_expired:
• close_notify :alert before closing the write side of a connection.
24
SOURCES USED
 Cryptography and Network Security, Principles and
Practices, 4th Ed., William Stallings.
 Cryptography and Network Security, Atul kahate.
 www.wikipedia.com
 A few other internet resources
25
26

More Related Content

What's hot

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSLSagar Mali
 
SSL Secure Socket Layer
SSL Secure Socket LayerSSL Secure Socket Layer
SSL Secure Socket Layeromkar bhagat
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureBrian Ritchie
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)Vishal Kumar
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer SecurityByronKimani
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocolMousmi Pawar
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYMonodip Singha Roy
 

What's hot (19)

Web Security
Web SecurityWeb Security
Web Security
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 
SSL Layer
SSL LayerSSL Layer
SSL Layer
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
SSL Secure Socket Layer
SSL Secure Socket LayerSSL Secure Socket Layer
SSL Secure Socket Layer
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
 
Security
SecuritySecurity
Security
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
Tls 1.3
Tls 1.3Tls 1.3
Tls 1.3
 
SSL
SSLSSL
SSL
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 

Similar to Secure Sockets Layer (SSL)

WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptSonukumarRawat
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdfDr. Shivashankar
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )Monodip Singha Roy
 
Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1Vishal Kumar
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptxAmnaNadeem27
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarDr. Shivashankar
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmIJCSEA Journal
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptxMARIA401634
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 

Similar to Secure Sockets Layer (SSL) (20)

Secure Socket Layer.pptx
Secure Socket Layer.pptxSecure Socket Layer.pptx
Secure Socket Layer.pptx
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Web security
Web securityWeb security
Web security
 
Unit 6
Unit 6Unit 6
Unit 6
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA Algorithm
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptx
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
SSL.pptx
SSL.pptxSSL.pptx
SSL.pptx
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 

Recently uploaded

Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 

Recently uploaded (20)

Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 

Secure Sockets Layer (SSL)

  • 1. BABA GHULAM SHAH BADSHAH UNIVERSITY RAJOURI Department of Computer Science and Applications ROLL NO. 19-MCS-2015 Semester:- 5th Course Title:- Cryptography And Network Security. Presentation Topic:- Secure Sockets Layer (SSL) 1
  • 2. WHAT IS SSL?  SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication.  The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted. 2
  • 3. WHAT IS SSL?  it provides a secure transport connection between applications (e.g., a web server and a browser).  SSL was developed by Netscape.  SSL version 3.0 has been implemented in many web browsers (e.g., Netscape Navigator and MS Internet Explorer) and web servers and widely used on the Internet.  TLS can be viewed as SSL v3.1 3
  • 4. Cont…  This link ensures that all data passed between the web server and browsers remain private and integral.  It provide two basic security services 1) Authentication. 2) Confidentiality.  It provide a secure pipeline between the web browser and web server. 4
  • 5. Cont...  SSL provides users with a secure communication channel for communication purpose between the client and the server.  It encrypt data packet at the sender’s end.  When these data packet arrive at the destination system, they decrypt to retrieve the original data.  In short, SSL encrypt data at the sender’s end and decrypt data at the receiver’s end. 5
  • 7. SSL HISTORY  Netscape developed The Secure Sockets Layer Protocol (SSL) in 1994, as a response to the growing concern over security on the Internet.  SSL was originally developed for securing web browser and server communications. 7
  • 8. SSL VERSION  There are several versions of the SSL protocol defined.  SSL Version  SSL Version 1.0  SSL Version 2.0  SSL Version 3.0  TLS Version 1.0  TLS Version 1.0 with SSL Version 3.0 compatibility 8
  • 9. Cont…  The latest version, the Transport Layer Security Protocol (TLS), is based on SSL 3.0  Version 1.0 was never publicly released;  version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0" 9
  • 10. Position of SSL in TCP/IP Application Layer SSL Layer Transport Layer Internet Layer Data Link Layer Physical Layer Fig. Position of SSL in TCP/IP • SSL can be conceptually considered as an additional layer in the TCP/IP protocol suite. • The SSL layer is located between the application layer and the transport layer, as shown in Figure 10
  • 11. L5 Data L5 Data L5 Data L4 Data L3 Data 0101010100010101010010 SH H4 H2 H3 L5 Data L5 Data L5 Data L4 Data L3 Data 0101010100010101010010 SH H4 H2 H3 Application SSL Transport Internet Data Link Physical Fig. SSL is located between application and transport layer Transmission Medium Cont… X Y 11
  • 12. How SSL Works?  SSL has three sub-protocols, namely:  The Handshake Protocol,  The Record Protocol and  The Alert Protocol. 12
  • 13. Handshaking Protocol  Protocol-allows server and client to authenticate negotiate encryption algorithm and cryptographic keys Type Length Contents Fig. Format of handshake protocol message 1 byte 3 bytes 1 or more bytes Indicate one of the ten possible message types Length of Message in byte Contain parameters associated with the message 13
  • 14. Handshaking made up of Four Phases 14
  • 15. Phase 1. Establishing Security Capabilities Fig. Phase 1. Establishing Security Capabilities • The first phase of SSL handshake is used to initiate a logical connection and establish the security capabilities associated with that connection • This consists of two message Client hello and Server hello. 15
  • 16. Phase 2 :-Server Authentication and key exchange  The server initiates this second phase of the SSL handshake, and is the sole sender of all the messages in the phase.  The client is the sole recipient of all these message.  This phase contain the four steps. 16
  • 17. Phase 2. Server Authentication and key exchange Step 1. Certificates Step 4. Server Hello done Step 2. Server key exchange Step 3. Certificate request Web Browse r Web Server 17
  • 18. Phase 3. Client Authentication and key exchange Step 1. Certificate Step 2. Client key exchange Step 3. Certificate verify Web Browse r Web Server 18
  • 19. Phase 4. Finish Step 1. Change of cipher Step 2. Finish Step 3 Change cipher specs Step 4. Finish Web Server Web Browse r 19
  • 20. Record Protocol  The record protocol came into picture after the successful handshake is completed between client and server.  This protocol provides two services 1) Confidentiality:- This can be achieve by using secret key that is defined by the handshake protocol 2) Integrity:- Handshake protocol also defines a shared secret key that is used for assuring message integrity. 20
  • 21. Record Protocol 1. fragmentation. Each upper-layer message is fragmented into blocks of 214 bytes (16384 bytes) or less. 2. Compression:- The fragmented blocks are optionally compressed. The compression process must not result into the loss of data 3. Add MAC:- using the shared secret key the message authentication code for each block is calculated. 4. Encryption:- using the symmetric key established previously in the handshake protocol, the output of previous step is now encrypted. This may not increases the overall size of block. 5. Append Header:- Finally a header is added to encrypted block. 21
  • 22. Alert Protocol  When client or server detects an error, the detecting party sends an alert message to the other party.  If the error is fatal, both the parties immediately close the SSL connection  Other error, which are not serve, do not result in the termination of the connection. Severity Cause Byte 1 Byte 2 Fig. Alert Protocol message format • Each alert message consist of 2 bytes. . If error is fatal, byte contain 2. Fist byte signifies the type of error. If it is warning, this byte contain 1 22
  • 23. Fatal alerts Fatal alerts  Unexpected message: An inappropriate message was received.  Bad_record_mac: An incorrect MAC was received.  Decompression_failure: function rerieved an improper input  Handshake_failure: 23
  • 24. No Fatal Alert/ Warning No Fatal Alert/ Warning • no_certificate: • bad_certificate: received certificate was corrupt • unsupported_certificate: The type of the received certificate is not supported. • certificate_expired: • close_notify :alert before closing the write side of a connection. 24
  • 25. SOURCES USED  Cryptography and Network Security, Principles and Practices, 4th Ed., William Stallings.  Cryptography and Network Security, Atul kahate.  www.wikipedia.com  A few other internet resources 25
  • 26. 26