SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
TRANSPORT LAYER
SECURITY
-Amr Magdy Mahmoud
- Ibrahim Albarki
PROF. HOSSSAM FAHMY
Submitted to :
The Secure socket Layer protocol
 Transport Layer Security TLS protocol, sometimes referred to, secure sockets layer
SSL protocol:
 Is a widely deployed protocol for securing client-server communications over the
internet.
 TLS is designed to prevent eavesdropping, tampering, and message forgery.
 The SSL protocol is:
- Stateful,
- connection-oriented,
- and a “client-server” protocol.
 It provides:
- Authentication,
- integrity,
- and confidentiality.
Definition
 According to the Internet Draft IETF of the SSL Protocol, the point of the protocol “is
to provide privacy and reliability between two communicating applications.”
Prof. Freier, Alan O.
 It is the most widely known as the protocol that, coupled with HTTP, secures the Web
and uses the “https” URI scheme
DEFINITION
History
 Before the web breaking, people accessed information on the internet using
protocols such as:
TELNET, FTP, and -a little later- Gopher.
 TLS faced at least two skirmishes,
- IPSEC, it was by far realized in kernel space; whereas the TLS is realized in the
user space. Ubiquitousness made the TLS won.
- The protocol question, between Netscape's SSL and Microsoft’s private
communications technology PCT that wasn’t widely deployed.
History - versions
- Netscape first development , 1.0, 1994.
- The second SSL, 2.0, 1995.
- SSL spread version, 3.0, 1996.
- SSL henceforth referred to as TLS since it moved from Netscape to the IETF TLS
working group (WG) in mid 1996.
- First TLS, 1.0, 1999.
- TLS 1.12006.
- TLS 1.2, 2008.
- TLS 1.3, currently under way.
SSL Protocol Design
SSL 3.0
Design
Handshaking
Protocol
Record
Protocol
Handshaking Protocol Functionalities:
- Negotiates the cipher suite,
- Authenticates the server and, optionally, the client and
- Establishes the session keys.
The Record Protocol:
- Secures the application data with the session key,
- Verifies the application data’s integrity and origin.
SSL DESIGN architecture
The handshaking Protocol actually has
three sub-protocols.
The “Change Cipher Protocol” informs the
peer about the set of keys change request.
The “alert” protocol notifies the peer
about the cause of protocol failure, It is not
normally sent during the handshake
protocol.
Diagram by, the computer science and Engineering Department,
The Ohio State University.
A Session’s Work-flow
Key exchange algorithms
- Anonymous Diffie-Hellman (DH)
- Ephemeral Diffie-Hellman (DHE)
Using DH or DHE, no need to send a server or client certification message, certificate request
or verify messages; instead, server sends a server key-exchange message that provide
information to encrypt the premaster secret.
An option to negotiate a pre-shared key PSK exists.
Key exchange algorithms
 - RSA; one of the first practicable public-key cryptosystems.
  Using PSK, An option is also available to support Secure Remote Passwords SRP cipher
suites.
A final word
TLS got its name from its record protocol since it performs in a transport-like
manner.
TLS handles fragmenting, receiving, and defragmenting.
Depending on the negotiated algorithms, data can be compresses, message
authentication coded (MACed), and encrypted before transmission and vice versa
reversed receival.
The important point, is that the TLS can be configured to operate as securely as
possible or in some horrifically broken way.
Cryptographic algorithms weaken over time, so it’s a good idea to check the server’s
configuration file to make sure of the ciphers strength.
TLS 1.3 Incoming goals
- Encrypt as much of the handshake as possible
- Reduce handshake latency
- Update payload protection to address cipher weaknesses
- Reevaluate handshake content
Summary
 TLS protocol provides transport layer security for Internet applications and
confidentiality using symmetric key cryptography and data integrity using a keyed
MAC, it also includes functionality for client and server authentication using public
key cryptography.
The Problem
The Problem
• securing client-server
communications over
the internet.
Solution
Solution
•Setup Some
Security (TLS)
The Story
The Story
The Story
The Story
The Story
The Story
The Story
Transport Layer Security

Contenu connexe

Tendances

Tendances (20)

SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
TLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkTLS/SSL Internet Security Talk
TLS/SSL Internet Security Talk
 
Ip security
Ip security Ip security
Ip security
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
IP Security
IP SecurityIP Security
IP Security
 
Wireshark
WiresharkWireshark
Wireshark
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Https
HttpsHttps
Https
 
Web Security
Web SecurityWeb Security
Web Security
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Introduction to TLS-1.3
Introduction to TLS-1.3 Introduction to TLS-1.3
Introduction to TLS-1.3
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Network security
 Network security Network security
Network security
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 

Similaire à Transport Layer Security

SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
Glenn Haley
 

Similaire à Transport Layer Security (20)

Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
SSL VS TLS.pptx
SSL VS TLS.pptxSSL VS TLS.pptx
SSL VS TLS.pptx
 
CN
CNCN
CN
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
Unit 6
Unit 6Unit 6
Unit 6
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
ssl
sslssl
ssl
 
Ssl https
Ssl httpsSsl https
Ssl https
 
Differences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdfDifferences to Know Between SSL & TLS certificate .pdf
Differences to Know Between SSL & TLS certificate .pdf
 
SSL.pptx
SSL.pptxSSL.pptx
SSL.pptx
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure Sockets Layer(SSL)Certificate
Secure Sockets Layer(SSL)CertificateSecure Sockets Layer(SSL)Certificate
Secure Sockets Layer(SSL)Certificate
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Transport Layer Security

  • 1. TRANSPORT LAYER SECURITY -Amr Magdy Mahmoud - Ibrahim Albarki
  • 3. The Secure socket Layer protocol  Transport Layer Security TLS protocol, sometimes referred to, secure sockets layer SSL protocol:  Is a widely deployed protocol for securing client-server communications over the internet.  TLS is designed to prevent eavesdropping, tampering, and message forgery.
  • 4.  The SSL protocol is: - Stateful, - connection-oriented, - and a “client-server” protocol.  It provides: - Authentication, - integrity, - and confidentiality. Definition
  • 5.  According to the Internet Draft IETF of the SSL Protocol, the point of the protocol “is to provide privacy and reliability between two communicating applications.” Prof. Freier, Alan O.  It is the most widely known as the protocol that, coupled with HTTP, secures the Web and uses the “https” URI scheme DEFINITION
  • 6. History  Before the web breaking, people accessed information on the internet using protocols such as: TELNET, FTP, and -a little later- Gopher.  TLS faced at least two skirmishes, - IPSEC, it was by far realized in kernel space; whereas the TLS is realized in the user space. Ubiquitousness made the TLS won. - The protocol question, between Netscape's SSL and Microsoft’s private communications technology PCT that wasn’t widely deployed.
  • 7. History - versions - Netscape first development , 1.0, 1994. - The second SSL, 2.0, 1995. - SSL spread version, 3.0, 1996. - SSL henceforth referred to as TLS since it moved from Netscape to the IETF TLS working group (WG) in mid 1996. - First TLS, 1.0, 1999. - TLS 1.12006. - TLS 1.2, 2008. - TLS 1.3, currently under way.
  • 8. SSL Protocol Design SSL 3.0 Design Handshaking Protocol Record Protocol Handshaking Protocol Functionalities: - Negotiates the cipher suite, - Authenticates the server and, optionally, the client and - Establishes the session keys. The Record Protocol: - Secures the application data with the session key, - Verifies the application data’s integrity and origin.
  • 9. SSL DESIGN architecture The handshaking Protocol actually has three sub-protocols. The “Change Cipher Protocol” informs the peer about the set of keys change request. The “alert” protocol notifies the peer about the cause of protocol failure, It is not normally sent during the handshake protocol. Diagram by, the computer science and Engineering Department, The Ohio State University.
  • 11. Key exchange algorithms - Anonymous Diffie-Hellman (DH) - Ephemeral Diffie-Hellman (DHE) Using DH or DHE, no need to send a server or client certification message, certificate request or verify messages; instead, server sends a server key-exchange message that provide information to encrypt the premaster secret. An option to negotiate a pre-shared key PSK exists.
  • 12. Key exchange algorithms  - RSA; one of the first practicable public-key cryptosystems.   Using PSK, An option is also available to support Secure Remote Passwords SRP cipher suites.
  • 13. A final word TLS got its name from its record protocol since it performs in a transport-like manner. TLS handles fragmenting, receiving, and defragmenting. Depending on the negotiated algorithms, data can be compresses, message authentication coded (MACed), and encrypted before transmission and vice versa reversed receival. The important point, is that the TLS can be configured to operate as securely as possible or in some horrifically broken way. Cryptographic algorithms weaken over time, so it’s a good idea to check the server’s configuration file to make sure of the ciphers strength.
  • 14. TLS 1.3 Incoming goals - Encrypt as much of the handshake as possible - Reduce handshake latency - Update payload protection to address cipher weaknesses - Reevaluate handshake content
  • 15. Summary  TLS protocol provides transport layer security for Internet applications and confidentiality using symmetric key cryptography and data integrity using a keyed MAC, it also includes functionality for client and server authentication using public key cryptography.
  • 16.
  • 17. The Problem The Problem • securing client-server communications over the internet.
  • 18.