SlideShare a Scribd company logo
Transport Layer Security
(TLS)
Secure Socket Layer
(SSL)
Group Members: Roll No.
Ali Akber 1406
Rana Assad Ali 1407
Qasim Ali 1425
Toseef Khadim 1427
BS(cs 4rth smester)
Topic
SSL
(Secure Socket Layer)
SSL History
 Netscape developed The Secure Sockets Layer Protocol
(SSL) in 1994, as a response to the growing concern over
security on the Internet.
 SSL was originally developed for securing web browser and
server communications.
 SSL v3.0 was specified in an Internet Draft (1996)
SSL (Secure Socket Layer)
 SSL is a Secure Sockets Layer
 SSL is the standard security technology for establishing an
encrypted link between a web server and a browser.
 This link ensures that all data passed between the web
server and browsers remain private and integral
 There are several versions of the SSL protocol defined. The
latest version, the Transport Layer Security Protocol (TLS),
is based on SSL 3.0
SSL Version 1.0
SSL Version 2.0
SSL Version 3.0
Where SSL fits?
HTTP SMTP POP3
80 25 110
HTTPS SSMTP SPOP3
443 465 995
Secure Socket Layer
Transport
Network
Data Link
Port
No.
SSL architecture
SSL
Handshake
Protocol
SSL change
Cipher Spec
Protocol
SSL Alert
Protocol
Applications
(e.g., HTTP)
SSL Record Protocol
TCP
IP
SSL
 It is the most widely known as the protocol that, coupled
with HTTP, secures the Web and uses the “https” URI
scheme
SSL components
 SSL Handshake Protocol
 Negotiation of security algorithms and parameters
 Key exchange
 Server authentication and optionally client authentication
 SSL Record Protocol
 Fragmentation
 Compression
 Message authentication and integrity protection
 Encryption
 SSL Alert Protocol
 Error messages (fatal alerts and warnings)
 SSL Change Cipher Spec Protocol
 A single message that indicates the end of the SSL handshake
SSL Goals
 Confidentiality
 The data being transmitted over the Internet or network needs confidentiality. In
 other words, people do not want their credit card number, account login,
 passwords or personal information to be exposed over the Internet.
 Integrity Protection
 The data needs to remain integral, which means that once credit card details and
 the amount to be charged to the credit card have been sent, a hacker sitting in
 the middle cannot change the amount to be cha rged and where the funds should
 go.
 Authentication
 Your organization needs identity assurance to authenticate itself to customers /
 extranet users and ensure them they are dealing with the right organization.
 Your organization needs to comply with regional, national or international
 regulations on data privacy, security and integrity
Reality!!!
Transport Layer Security
(TLS)
Two protocols are dominant today for providing
security at the transport layer
 Secure Sockets Layer (SSL) protocol
 Transport Layer Security (TLS) protocol
Definition:
 Transport Layer Security (TLS) was designed to
provide security at the transport layer.
 TLS was derived from a security protocol called
Secure Sockets Layer (SSL).
Transport Layer Security
(TLS)
 TLS is the successor to the Secure Sockets Layer (SSL).
 Transport Layer Security (TLS) is a protocol that ensures
privacy between communicating applications and their
users on the Internet.
 Is a widely deployed protocol for securing client-server
communications over the internet.
 TLS is designed to prevent eavesdropping, tampering,
and message forgery
Why do we need it?
 TLS ensures that no third party may eavesdrop or
tamper with any message.
Working of Transport Layer
Security
 The Client connect to server (using TCP). The client can
be anything.
 The Client sends a number of specifications :
 Version of SSL/TLS
 Which cipher suites, compression method it wants to use.
Ver : TLS
1.2
CS:RSA,DSA
,RC4
COMPMETH
OD
Working of Transport Layer
Security
 The server checks what the highest SSL/TLS version is
that is supported by them both, picks a cipher suite from
one of the client's options (if it supports one), and
optionally picks a compression method.
Client
Ver : TLS
1.2 
CS:
RSA 
DSA
RC4
COMPMETH
OD
Server
Ver : TLS
1.1
1.2
1.3
CS:RSA 
COMPMETHOD
Working of Transport Layer
Security
 After this the basic setup is done, the server sends its
certificate.
 This certificate must be trusted by either the client itself
or a party that the client trusts.
 For example if the client trusts GeoTrust, then the client
can trust the certificate from Google.com, because
GeoTrust cryptographically signed Google's certificate.
Working of Transport Layer
Security
 Having verified the certificate and being certain this
server really is who he claims to be (and not a man in
the middle), a key is exchanged.
 This can be a public key, a "PreMasterSecret" or simply
nothing, depending on the chosen ciphersuite.
Working of Transport Layer
Security
 Both the server and the client can now compute the key
for the symmetric encryption.
0100100001100
1010110110001
1011000110111
1
Hello
Working of Transport Layer
Security
 The handshake is now finished, and the two hosts can
communicate securely.
Working of Transport Layer
Security
 To close the connection, a close notify 'alert' is used. If
an attacker tries to terminate the connection by finishing
the TCP connection (injecting a FIN packet), both sides
will know the connection was improperly terminated.
The connection cannot be compromised by this though,
merely interrupted
Ok. Gtg
bye..
Ok see you
later. TC
Benefits of TLSSSL
 Encryption
 TLS can help to secure transmitted data using encryption.
 Interoperability
 TLS works with most Web browsers, including Microsoft Internet Explorer and Netscape
Navigator, and on most operating systems and Web servers.
 Algorithm flexibility
 TLS provides options for the authentication mechanisms, encryption algorithms, and
hashing algorithms that are used during the secure session.
 Ease of deployment
 Many applications use TLS transparently on a Windows Server 2003 operating systems.
 Ease of use
 Because you implement TLS beneath the application layer, most of its operations are
completely invisible to the client.
Govt municipal degree college Faisalabad

More Related Content

What's hot

Https presentation
Https presentationHttps presentation
Https presentation
patel jatin
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
The origin and evaluation criteria of aes
The origin and evaluation criteria of aesThe origin and evaluation criteria of aes
The origin and evaluation criteria of aes
MDKAWSARAHMEDSAGAR
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Aes
AesAes
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Huda Seyam
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Hash function
Hash function Hash function
Hash function
Salman Memon
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Pina Parmar
 

What's hot (20)

Https presentation
Https presentationHttps presentation
Https presentation
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
The origin and evaluation criteria of aes
The origin and evaluation criteria of aesThe origin and evaluation criteria of aes
The origin and evaluation criteria of aes
 
Web Security
Web SecurityWeb Security
Web Security
 
Email security
Email securityEmail security
Email security
 
Aes
AesAes
Aes
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Hash function
Hash function Hash function
Hash function
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Similar to Ssl and tls

What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
Shehzad Imran
 
CN
CNCN
CN
sowfi
 
SSL.pptx
SSL.pptxSSL.pptx
SSL VS TLS.pptx
SSL VS TLS.pptxSSL VS TLS.pptx
SSL VS TLS.pptx
Vignesh kumar
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
Ibrahiem Mohammed
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
csandit
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
cscpconf
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
CSCJournals
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
Amar Shah
 
Differences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdfDifferences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdf
Host It Smart
 
Ssl https
Ssl httpsSsl https
Ssl https
Andrada Boldis
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
SonukumarRawat
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
CheapSSLUSA
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Emprovise
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYMonodip Singha Roy
 

Similar to Ssl and tls (20)

What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
 
CN
CNCN
CN
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
SSL.pptx
SSL.pptxSSL.pptx
SSL.pptx
 
Unit 6
Unit 6Unit 6
Unit 6
 
SSL VS TLS.pptx
SSL VS TLS.pptxSSL VS TLS.pptx
SSL VS TLS.pptx
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
Differences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdfDifferences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdf
 
Ssl https
Ssl httpsSsl https
Ssl https
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 

Ssl and tls

  • 1. Transport Layer Security (TLS) Secure Socket Layer (SSL) Group Members: Roll No. Ali Akber 1406 Rana Assad Ali 1407 Qasim Ali 1425 Toseef Khadim 1427 BS(cs 4rth smester) Topic
  • 3. SSL History  Netscape developed The Secure Sockets Layer Protocol (SSL) in 1994, as a response to the growing concern over security on the Internet.  SSL was originally developed for securing web browser and server communications.  SSL v3.0 was specified in an Internet Draft (1996)
  • 4. SSL (Secure Socket Layer)  SSL is a Secure Sockets Layer  SSL is the standard security technology for establishing an encrypted link between a web server and a browser.  This link ensures that all data passed between the web server and browsers remain private and integral  There are several versions of the SSL protocol defined. The latest version, the Transport Layer Security Protocol (TLS), is based on SSL 3.0 SSL Version 1.0 SSL Version 2.0 SSL Version 3.0
  • 5. Where SSL fits? HTTP SMTP POP3 80 25 110 HTTPS SSMTP SPOP3 443 465 995 Secure Socket Layer Transport Network Data Link Port No.
  • 6. SSL architecture SSL Handshake Protocol SSL change Cipher Spec Protocol SSL Alert Protocol Applications (e.g., HTTP) SSL Record Protocol TCP IP
  • 7. SSL  It is the most widely known as the protocol that, coupled with HTTP, secures the Web and uses the “https” URI scheme
  • 8. SSL components  SSL Handshake Protocol  Negotiation of security algorithms and parameters  Key exchange  Server authentication and optionally client authentication  SSL Record Protocol  Fragmentation  Compression  Message authentication and integrity protection  Encryption  SSL Alert Protocol  Error messages (fatal alerts and warnings)  SSL Change Cipher Spec Protocol  A single message that indicates the end of the SSL handshake
  • 9. SSL Goals  Confidentiality  The data being transmitted over the Internet or network needs confidentiality. In  other words, people do not want their credit card number, account login,  passwords or personal information to be exposed over the Internet.  Integrity Protection  The data needs to remain integral, which means that once credit card details and  the amount to be charged to the credit card have been sent, a hacker sitting in  the middle cannot change the amount to be cha rged and where the funds should  go.  Authentication  Your organization needs identity assurance to authenticate itself to customers /  extranet users and ensure them they are dealing with the right organization.  Your organization needs to comply with regional, national or international  regulations on data privacy, security and integrity
  • 12. Two protocols are dominant today for providing security at the transport layer  Secure Sockets Layer (SSL) protocol  Transport Layer Security (TLS) protocol
  • 13. Definition:  Transport Layer Security (TLS) was designed to provide security at the transport layer.  TLS was derived from a security protocol called Secure Sockets Layer (SSL).
  • 14. Transport Layer Security (TLS)  TLS is the successor to the Secure Sockets Layer (SSL).  Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet.  Is a widely deployed protocol for securing client-server communications over the internet.  TLS is designed to prevent eavesdropping, tampering, and message forgery
  • 15. Why do we need it?  TLS ensures that no third party may eavesdrop or tamper with any message.
  • 16. Working of Transport Layer Security  The Client connect to server (using TCP). The client can be anything.  The Client sends a number of specifications :  Version of SSL/TLS  Which cipher suites, compression method it wants to use. Ver : TLS 1.2 CS:RSA,DSA ,RC4 COMPMETH OD
  • 17. Working of Transport Layer Security  The server checks what the highest SSL/TLS version is that is supported by them both, picks a cipher suite from one of the client's options (if it supports one), and optionally picks a compression method. Client Ver : TLS 1.2  CS: RSA  DSA RC4 COMPMETH OD Server Ver : TLS 1.1 1.2 1.3 CS:RSA  COMPMETHOD
  • 18. Working of Transport Layer Security  After this the basic setup is done, the server sends its certificate.  This certificate must be trusted by either the client itself or a party that the client trusts.  For example if the client trusts GeoTrust, then the client can trust the certificate from Google.com, because GeoTrust cryptographically signed Google's certificate.
  • 19. Working of Transport Layer Security  Having verified the certificate and being certain this server really is who he claims to be (and not a man in the middle), a key is exchanged.  This can be a public key, a "PreMasterSecret" or simply nothing, depending on the chosen ciphersuite.
  • 20. Working of Transport Layer Security  Both the server and the client can now compute the key for the symmetric encryption. 0100100001100 1010110110001 1011000110111 1 Hello
  • 21. Working of Transport Layer Security  The handshake is now finished, and the two hosts can communicate securely.
  • 22. Working of Transport Layer Security  To close the connection, a close notify 'alert' is used. If an attacker tries to terminate the connection by finishing the TCP connection (injecting a FIN packet), both sides will know the connection was improperly terminated. The connection cannot be compromised by this though, merely interrupted Ok. Gtg bye.. Ok see you later. TC
  • 23. Benefits of TLSSSL  Encryption  TLS can help to secure transmitted data using encryption.  Interoperability  TLS works with most Web browsers, including Microsoft Internet Explorer and Netscape Navigator, and on most operating systems and Web servers.  Algorithm flexibility  TLS provides options for the authentication mechanisms, encryption algorithms, and hashing algorithms that are used during the secure session.  Ease of deployment  Many applications use TLS transparently on a Windows Server 2003 operating systems.  Ease of use  Because you implement TLS beneath the application layer, most of its operations are completely invisible to the client.
  • 24. Govt municipal degree college Faisalabad

Editor's Notes

  1. The first difference is the version number (major and minor). The current version of SSL is 3.0; the current version of TLS is 1.0. In other words, SSLv3.0 is compatible with TLSv1.0. Another minor difference between SSL and TLS is the lack of support for the Fortezza method. TLS does not support Fortezza for key exchange or for encryption/decryption. “standardized” by IETF RFC2246.