SlideShare a Scribd company logo
“Secure Socket Layer”
Project Presentation by:


    Dwiti Gajab




    Mihir Trivedi




    Aman Chaurasia




05/26/12                             1
Contents:
    Cryptography and Secure Socket Layer
    (SSL)

   Establishment of Secured connection for “Encryption”

   Briefing on Asymmetric Encryption algorithms




05/26/12                                                   2
Cryptography:
              Security and Integrity

              Encryption helps in achieving this.

              SSL is one such type of protocols. Its two main
               functions are:

              Encryption

              Identification

05/26/12                                                         3
Why SSL exists?




05/26/12             4
SSL Architecture:




05/26/12               5
Few terms:
   Certificate:
- It is used to authenticate the website.
- Issued by Certificate Authority (CA).
- Mainly contains:
          Public Key

          Digital Signature



    Hashing:
     - It is a process that compresses text to a single number.
     - Used in a certificate and in SSL handshaking.

    05/26/12                                                      6
Data Transfer:
   Asymmetric Data Transfer
    - Used in handshaking
    - Two Keys are involved:
         Public Key: It is used to encrypt.
         Private Key: It is used to decrypt.


   Symmetric Data Transfer
          Used in application data transfer.
          Same key is used in encryption & decryption.


05/26/12                                                  7
SSL Handshaking:




05/26/12              8
Encryption Algorithms:
   Computers agree how to encrypt !


                  A                                        B

    Key           Cipher        Hash          Key           Cipher        Hash


                                              RSA            DES        HAC- MD5
    RSA            DES        HAC- MD5

Diffie Hellman   Triple DES   HMAC- SHA   Diffie Hellman   Triple DES   HMAC- SHA
                   AES                                       AES
                   RC4                                       RC4




 05/26/12                                                                           9
05/26/12   10
05/26/12   11
05/26/12   12
05/26/12   13
05/26/12   14
Asymmetric Key Cryptography:
   Diffi Hellman algorithm
   Rivest, Shamir and Adleman (RSA) algorithm




    05/26/12                                     15
Symmetric key Cryptography:
   Used for encryption of data.

   Substitution/Transposition/Simple round ciphers.

   Modern round ciphers: DES, Triple DES, AES




    05/26/12                                           16
Future Scope:
   Development of RSA algorithm for better security.


    References:
   Data communication and Networking, 4E, by Behrouz A.
    Forouzan
   Computer Networks by Ross & Kurose
   Network Security IOS by CISCO.
   http://en.wikipedia.org/wiki/Secure_Sockets_Layer
   http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html

05/26/12                                                17
Any Questions???

           Thank You…




05/26/12                      18

More Related Content

PPTX
Ssl for e commerce
PPT
Secure Socket Layer
PPT
Secure Socket Layer (SSL)
PPT
SSL & TLS Architecture short
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PPSX
Secure socket layer
Ssl for e commerce
Secure Socket Layer
Secure Socket Layer (SSL)
SSL & TLS Architecture short
What is SSL ? The Secure Sockets Layer (SSL) Protocol
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
Secure socket layer

What's hot (20)

PPTX
Securing TCP connections using SSL
PPTX
Secure Socket Layer
PPTX
Secure Socket Layer
PPTX
OpenSSL
PPT
PPTX
Pgp pretty good privacy
PPT
Introduction To PKI Technology
PDF
SSL/TLS
PPTX
public key infrastructure
PDF
SSL/TLS for Mortals (Voxxed Days Luxembourg)
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Final ppt ecommerce
PPT
security in transport layer ssl
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
web security
PPT
Pgp
PPT
Ssl (Secure Sockets Layer)
PDF
PDF
Network security cs8
Securing TCP connections using SSL
Secure Socket Layer
Secure Socket Layer
OpenSSL
Pgp pretty good privacy
Introduction To PKI Technology
SSL/TLS
public key infrastructure
SSL/TLS for Mortals (Voxxed Days Luxembourg)
CRYPTOGRAPHY AND NETWORK SECURITY
Final ppt ecommerce
security in transport layer ssl
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
web security
Pgp
Ssl (Secure Sockets Layer)
Network security cs8
Ad

Similar to Secure Socket Layer (20)

PPTX
Secure socket layer working
PDF
Introduction to and survey of TLS security (BsidesHH 2014)
PPTX
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
PPTX
Random musings on SSL/TLS configuration
PPT
Introduction to Secure Sockets Layer
PPTX
Difference between ECC and RSA PublicKey
PDF
ALGORITHM OF RSA AND DSA CRYPTOGRAPHY.pdf
PDF
Introduction to and survey of TLS Security
PDF
computer-security-and-cryptography-a-simple-presentation
PDF
Introduction to and survey of TLS Security
PDF
Data encryption algorithm(edit)
PDF
Web cryptography javascript
PDF
How to Gain Visibility into Encrypted Threats
PDF
SSL/TLS Handshake
PDF
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
PPTX
Sequere socket Layer
PDF
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
PDF
Go paranoid
PPT
Java Crypto
Secure socket layer working
Introduction to and survey of TLS security (BsidesHH 2014)
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
Random musings on SSL/TLS configuration
Introduction to Secure Sockets Layer
Difference between ECC and RSA PublicKey
ALGORITHM OF RSA AND DSA CRYPTOGRAPHY.pdf
Introduction to and survey of TLS Security
computer-security-and-cryptography-a-simple-presentation
Introduction to and survey of TLS Security
Data encryption algorithm(edit)
Web cryptography javascript
How to Gain Visibility into Encrypted Threats
SSL/TLS Handshake
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
Sequere socket Layer
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
Go paranoid
Java Crypto
Ad

Recently uploaded (20)

PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
RMMM.pdf make it easy to upload and study
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Business Ethics Teaching Materials for college
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Week 4 Term 3 Study Techniques revisited.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Supply Chain Operations Speaking Notes -ICLT Program
Complications of Minimal Access Surgery at WLH
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
RMMM.pdf make it easy to upload and study
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Business Ethics Teaching Materials for college
STATICS OF THE RIGID BODIES Hibbelers.pdf
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Abdominal Access Techniques with Prof. Dr. R K Mishra
TR - Agricultural Crops Production NC III.pdf
Anesthesia in Laparoscopic Surgery in India
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Secure Socket Layer

  • 1. “Secure Socket Layer” Project Presentation by:  Dwiti Gajab  Mihir Trivedi  Aman Chaurasia 05/26/12 1
  • 2. Contents:  Cryptography and Secure Socket Layer (SSL)  Establishment of Secured connection for “Encryption”  Briefing on Asymmetric Encryption algorithms 05/26/12 2
  • 3. Cryptography:  Security and Integrity  Encryption helps in achieving this.  SSL is one such type of protocols. Its two main functions are:  Encryption  Identification 05/26/12 3
  • 6. Few terms:  Certificate: - It is used to authenticate the website. - Issued by Certificate Authority (CA). - Mainly contains:  Public Key  Digital Signature  Hashing: - It is a process that compresses text to a single number. - Used in a certificate and in SSL handshaking. 05/26/12 6
  • 7. Data Transfer:  Asymmetric Data Transfer - Used in handshaking - Two Keys are involved:  Public Key: It is used to encrypt.  Private Key: It is used to decrypt.  Symmetric Data Transfer  Used in application data transfer.  Same key is used in encryption & decryption. 05/26/12 7
  • 9. Encryption Algorithms: Computers agree how to encrypt ! A B Key Cipher Hash Key Cipher Hash RSA DES HAC- MD5 RSA DES HAC- MD5 Diffie Hellman Triple DES HMAC- SHA Diffie Hellman Triple DES HMAC- SHA AES AES RC4 RC4 05/26/12 9
  • 10. 05/26/12 10
  • 11. 05/26/12 11
  • 12. 05/26/12 12
  • 13. 05/26/12 13
  • 14. 05/26/12 14
  • 15. Asymmetric Key Cryptography:  Diffi Hellman algorithm  Rivest, Shamir and Adleman (RSA) algorithm 05/26/12 15
  • 16. Symmetric key Cryptography:  Used for encryption of data.  Substitution/Transposition/Simple round ciphers.  Modern round ciphers: DES, Triple DES, AES 05/26/12 16
  • 17. Future Scope:  Development of RSA algorithm for better security. References:  Data communication and Networking, 4E, by Behrouz A. Forouzan  Computer Networks by Ross & Kurose  Network Security IOS by CISCO.  http://en.wikipedia.org/wiki/Secure_Sockets_Layer  http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html 05/26/12 17
  • 18. Any Questions??? Thank You… 05/26/12 18