SlideShare a Scribd company logo
1 of 33
1
Secure Socket Layer
•Dr Paras Kothari
2
SSL Facts
• SSL was first developed by Netscape in 1994
and became an internet standard in 1996 (
RFC 2246 – TLS V1.0)
• SSL is a cryptographic protocol to secure
network across a connection-oriented layer
• Any program using TCP can be modified to
use SSL connection
3
SSL Facts
• SSL connection uses a dedicated TCP/IP
socket(e.g. port 443 for https)
• SSL is flexible in choice of which symmetric
encryption, message digest, and authentication can
be used
• SSL provides built in data compression
4
SSL Usage
• Authenticate the server to the client
• Allow the client and server to select cryptographic
algorithms, or ciphers, that they both support
• Optionally authenticate the client to the server
• Use public key encryption techniques to generate
shared secret
• Establish an encrypted SSL connection
5
Secure Socket Layer
SSL is a secure protocol which runs above TCP/IP
and allows users to encrypt data and authenticate
servers/vendors identity securely
Application
layer
Transport
layerTCP/IP Layer
SMTPSFTPSHTTPS
SECURE SOCKET LAYER
6
SSL Stack
7
SSL Record Protocol Operation
8
SSL Record Format
9
SSL Handshake
SSL handshake verifies the server and allows
client and server to agree on an encryption set
before any data is sent out
10
SSL Handshake
11
SSL Handshake
Server
Client
Public
key
Private
key
Client
request
Public key
12
SSL Session Key
Server
Client
Public
key
Private
key
Public key Pre-Master
Pre-
Master
Pre-
Master
Session key
Session key
13
Secure Data on Network
Server
Client
Public
key
Private
key
Session
key
Data Session key Data
Data
Data Session key Data
14
Man-in-the-Middle Attack
Server
Client
Public
key
Private
key
Hacker
Public
key
Private
key
Pre-
master
Public
key
Public
key
Public key
Session
key
Pre-master
Public
key
Pre-
master
Pre-
master
Session
key
15
Key exchange and certificate
SSL version number client supported
(v2, v3)
Ciphers supported client
(DES, RC2, RC4)
Client Random Number
SSL version number server picked
(v2, v3)
Ciphers server picked
(DES, RC2, RC4)
Server Random Number
Server
Client
Public
key
Private
key
Public key
Certificate
16
Verify Certificate
Checking
Server
Client
Public
key
Private
key
Client
request
Certificate
Certificate
Valid
Public key
Certificate is Good and Valid
Server/vendor has been verified and authenticated
Client has vendor’s public key and
can now encrypt pre-master to send
to server/vendor
17
Not-recognizable Certificate
18
SSL Handshake
Client hello
Server hello
Present Server Certificate
*Request Client Certificate
Server Key Exchange
Client Finish
*Present Client Certificate
Client Key Exchange
*Certificate Verify
Change Cipher Spec
Server Finish
Change Cipher Spec
Client
Server
Application Data
19
Server Hello Request
• Notifies the client that they should send a client hello
message to begin the negotiation process
• Sent by the server at any time
• After the server sends a request, it does not send
another one until a handshake has been completed
• Client can choose to ignore them or send a Client
Hello
20
Client Hello
• Sent by the client
–When first connecting to a server
–In response to a hello request or on its own
• Contains
–32 bytes random number created by a
secure random number generator
–Protocol version
–Session ID
–A list of supported ciphers
–A list of compression methods
21
Server Hello
• Sent as response if client hello is accepted
– If not, a handshake failure alert is sent
• Contains
– 32 bytes random number created by a secure random
number generator
– Protocol version
– Session ID
– Cipher suite chosen
– Compression method selected
22
Server Certificates
• Immediately following the server hello, the
server sends its certificate
– Generally an X.509.v3 certificate
• Server sends server hello done message
23
Key Exchange
• Client sends 48-bytes pre-master, encrypted
using server’s public key, to the server
• Both server and client use the pre-master to
generate the master secret
• A same session key is generated on both
client and server side using the master secret
24
SSL Architecture
25
Record Layer
• Compression and decompression
• A MAC is applied to each record using the MAC
algorithm defined in the current cipher spec
• Encryption occurs after compression
• May need fragmentation
26
SSL Architecture
27
Alert Layer
• Explain severity of the message and a description
–fatal
•Immediate termination
•Other connections in session may continue
•Session ID invalidated to prevent failed session to open new
sessions
• Alerts are compressed same as other data
28
SSL Architecture
29
Change Cipher Spec Protocol
• Notify the other party to use the new
cipher suite
• Before the Finished message
30
Comparison of SSL V2.0 and V3.0
• SSL 2.0 is vulnerable to “man-in-the-
middle” attack. The hello message can
be modified to use 40 bits encryption.
SSL 3.0 defends against this attack by
having the last handshake message
include a hash of all the previous
handshake message
31
Comparison of SSL V2.0 and V3.0
• SSL 2.0 uses a weak MAC construction
• In SSL 3.0, the Message Authentication
Hash uses a full 128 bits of key material
for Export cipher, while SSL 2.0 uses
only 40 bits
32
Comparison of SSL V2.0 and V3.0
• SSL 2.0 only allows a handshake at the beginning of
the connection. In 3.0, the client can initiate a
handshake routine any time
• SSL 3.0 allows server and client to send chains of
certificate
• SSL 3.0 has a generalized key exchange protocol. It
allows Diffie-Hellman and Fortezza key exchange
• SSL 3.0 allows for record compression and
decompression
Query Session
Still if you have …
33

More Related Content

What's hot

What's hot (20)

SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Ipsec
IpsecIpsec
Ipsec
 
Web Security
Web SecurityWeb Security
Web Security
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Ssl https
Ssl httpsSsl https
Ssl https
 

Similar to Secure socket layer

SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
BAIT1103 Chapter 4
BAIT1103 Chapter 4BAIT1103 Chapter 4
BAIT1103 Chapter 4
limsh
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
Mousmi Pawar
 

Similar to Secure socket layer (20)

SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.ppt
 
SSL Secure Socket Layer
SSL Secure Socket LayerSSL Secure Socket Layer
SSL Secure Socket Layer
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mir
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
BAIT1103 Chapter 4
BAIT1103 Chapter 4BAIT1103 Chapter 4
BAIT1103 Chapter 4
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 
Transportsec
TransportsecTransportsec
Transportsec
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
8.SSL encryption.ppt
8.SSL encryption.ppt8.SSL encryption.ppt
8.SSL encryption.ppt
 
Unit08
Unit08Unit08
Unit08
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Webinar SSL English
Webinar SSL EnglishWebinar SSL English
Webinar SSL English
 

More from Nishant Pahad

More from Nishant Pahad (20)

International business 1
International business 1International business 1
International business 1
 
International business 4 WORLD TRADE
International business 4 WORLD TRADEInternational business 4 WORLD TRADE
International business 4 WORLD TRADE
 
International business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMInternational business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEM
 
10 online transactions
10 online transactions10 online transactions
10 online transactions
 
Micro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkMicro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory framework
 
Credit facilities and support services
Credit facilities and support services Credit facilities and support services
Credit facilities and support services
 
e-business technologies and trends
e-business technologies and trendse-business technologies and trends
e-business technologies and trends
 
E ticketing
E ticketing E ticketing
E ticketing
 
E marketing planning
E marketing planningE marketing planning
E marketing planning
 
E marketing planning
E marketing planningE marketing planning
E marketing planning
 
E - governance
E - governanceE - governance
E - governance
 
E governance
E governance E governance
E governance
 
E banking
E bankingE banking
E banking
 
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESUnit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
 
Online commodity trading
Online commodity tradingOnline commodity trading
Online commodity trading
 
commodity trading and derivatives
commodity trading and derivativescommodity trading and derivatives
commodity trading and derivatives
 
Commodity derivatives
Commodity derivativesCommodity derivatives
Commodity derivatives
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
EDI
EDIEDI
EDI
 
E business models
E business modelsE business models
E business models
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Secure socket layer