SlideShare a Scribd company logo
SSL working
102/09/12



Contents:
202/09/12
 Cryptography and Secure Socket Layer
(SSL)
 Establishment of Secured connection for “Encryption”
 Briefing on Asymmetric Encryption algorithms
Cryptography:
302/09/12
 Security and Integrity
 Encryption helps in achieving this.
 SSL is one such type of protocols. Its two main
functions are:
 Encryption
 Identification
Why SSL exists?
402/09/12
SSL Architecture:
502/09/12
Few terms:
 Certificate:
- It is used to authenticate the website.
- Issued by Certificate Authority (CA).
- Mainly contains:
 Public Key
 Digital Signature
 Hashing:
- It is a process that compresses text to a single number.
- Used in a certificate and in SSL handshaking.
602/09/12
Data Transfer:
702/09/12
 Asymmetric Data Transfer
- Used in handshaking
- Two Keys are involved:
 Public Key: It is used to encrypt.
 Private Key: It is used to decrypt.
 Symmetric Data Transfer


Used in application data transfer.
Same key is used in encryption & decryption.
SSL Protocol Design
SSL 3.0
Design
Handshaking
Protocol
Record
Protocol
Handshaking Protocol Functionalities:
- Negotiates the cipher suite,
- Authenticates the server and, optionally, the client and
- Establishes the session keys.
The Record Protocol:
- Secures the application data with the session key,
- Verifiestheapplicationdata’s integrityandorigin.
SSL DESIGN architecture
The handshaking Protocol actually has
three sub-protocols.
The“ChangeCipherProtocol”informsthe
peer about the set of keys change request.
The“alert”protocol notifiesthepeer about
the cause of protocol failure, It is not
normally sent during the handshake
protocol.
Diagram by, the computer science and Engineering Department,
The Ohio State University.
A Session’s Work-flow
Key exchange algorithms
- Anonymous Diffie-Hellman (DH)
- Ephemeral Diffie-Hellman (DHE)
Using DH or DHE,no need to send a server or client certification message, certificate request
or verify messages; instead, server sends a server key-exchange message that provide
information to encrypt the premaster secret.
An option to negotiate a pre-shared key PSK exists.
SSL Handshaking:
1202/09/12
4. Record protocol
Secure socket layer working
Encryption Algorithms:
Key Cipher Hash
RSA DES HAC- MD5
Diffie Hellman Triple DES HMAC- SHA
AES
RC4
A B
Key Cipher Hash
RSA DES HAC- MD5
Diffie Hellman Triple DES HMAC- SHA
AES
RC4
1502/09/12
Computers agree how to encrypt !
Secure socket layer working
The Problem
The Problem
•securing client-server
communications over
the internet.
Secure socket layer working
Solution
Solution
•Setup Some
Security (TLS)
The
Stor
y
The
Stor
y
The
Stor
y
The
Stor
y
The
Stor
y
The
Stor
y
The
Stor
y
Secure socket layer working
Asymmetric Key Cryptography:


Diffi Hellman algorithm
Rivest, Shamir and Adleman (RSA) algorithm
2802/09/12
Symmetric key Cryptography:
2902/09/12
 Used for encryption of data.
 Substitution/Transposition/Simple round ciphers.
 Modern round ciphers: DES, Triple DES, AES

More Related Content

PPTX
Transport Layer Security (TLS)
PPT
Secure Socket Layer (SSL)
PDF
[POSS 2019] TLS for Dummies
PPTX
Secure Socket Layer
PPT
PPT
PPTX
Securing TCP connections using SSL
PPSX
Secure socket layer
Transport Layer Security (TLS)
Secure Socket Layer (SSL)
[POSS 2019] TLS for Dummies
Secure Socket Layer
Securing TCP connections using SSL
Secure socket layer

What's hot (20)

PPTX
secure socket layer
PPTX
The Fundamental of Secure Socket Layer (SSL)
PPT
security in transport layer ssl
PDF
SSL Secure socket layer
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PPT
X 509 Certificates How And Why In Vb.Net
PDF
PPTX
Secure Socket Layer (SSL)
PPTX
Transport layer security
PDF
SSL/TLS Handshake
PPTX
SSL TLS Protocol
PPT
Secure Socket Layer
DOC
PPTX
Secure Socket Layer
DOCX
Elliptic curve cryptography
PDF
SSL/TLS
PPTX
SSL And TLS
PPT
Web Security
secure socket layer
The Fundamental of Secure Socket Layer (SSL)
security in transport layer ssl
SSL Secure socket layer
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
X 509 Certificates How And Why In Vb.Net
Secure Socket Layer (SSL)
Transport layer security
SSL/TLS Handshake
SSL TLS Protocol
Secure Socket Layer
Secure Socket Layer
Elliptic curve cryptography
SSL/TLS
SSL And TLS
Web Security
Ad

Similar to Secure socket layer working (20)

PPTX
Ssl (Secure Socket Layer)
PDF
Improving the Secure Socket Layer by Modifying the RSA Algorithm
PPTX
Secure Sockets Layer (SSL)
PPT
Secure socket later
PPT
Secure Socket Layer.ppt [ssl for websecurity]
PPT
Ssl (Secure Sockets Layer)
DOCX
SSL-image
PPT
SSL basics and SSL packet analysis using wireshark
PPTX
Secure Socket Layer.pptx
PPTX
Network Security- Secure Socket Layer
PDF
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PDF
Transport Layer Security
PPSX
Secure socket layer
PPT
ssl
PPT
cryptography and network security thid.ppt
PPTX
Fundamental of Secure Socket Layer (SSL) | Part - 2
PPTX
Network and internet security
PPT
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
DOC
Demonstration of secure socket layer(synopsis)
Ssl (Secure Socket Layer)
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Secure Sockets Layer (SSL)
Secure socket later
Secure Socket Layer.ppt [ssl for websecurity]
Ssl (Secure Sockets Layer)
SSL-image
SSL basics and SSL packet analysis using wireshark
Secure Socket Layer.pptx
Network Security- Secure Socket Layer
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Transport Layer Security
Secure socket layer
ssl
cryptography and network security thid.ppt
Fundamental of Secure Socket Layer (SSL) | Part - 2
Network and internet security
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
Demonstration of secure socket layer(synopsis)
Ad

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PPT on Performance Review to get promotions
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
composite construction of structures.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
573137875-Attendance-Management-System-original
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CH1 Production IntroductoryConcepts.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
R24 SURVEYING LAB MANUAL for civil enggi
Model Code of Practice - Construction Work - 21102022 .pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Sustainable Sites - Green Building Construction
Foundation to blockchain - A guide to Blockchain Tech
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Operating System & Kernel Study Guide-1 - converted.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT on Performance Review to get promotions
Embodied AI: Ushering in the Next Era of Intelligent Systems
composite construction of structures.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

Secure socket layer working