SlideShare a Scribd company logo
1
SSL/TLS
2
Transport Layer Security Protocols
• Secure Socket Layer (SSL)
– Originally designed to by Netscape to secure HTTP
– Version 2 is being replaced by version 3
– Subsequently became Internet Standard known as TLS
– Use TCP to provide a reliable end-to-end service
– Application independent
• Can be used for any application protocol: telnet, ftp..
• Transport Layer Security (TLS)
– SSL 3.0 is very similar to TLS (RFC 2246)
3
Location of SSL
• SSL is build on top of
TCP
• Provides a TCP like
interface
• In theory can be used by
all type of applications in
a transparent manner
4
SSL Architecture
• Rely on TCP for a reliable communication
• Two Layers
– SSL Record Protocol provides basic security services
– Handshake, change cipher spec, Alert..
5
SSL Basic Protocol
6
SSL Session and Connection
• Each SSL session can be used for multiple
connections
• SSL Session
– An association between the client and the server
– Are used to avoid negotiation of new security
parameters for each connection
• SSL Connection
– A connection is a transport that provides a suitable
type of service
– Each connection is associated with one session
7
SSL Session
• A SSL session consists of
– Session ID
– X.509 public-key certificate of peer (could be null)
– Compression Algorithm
– Cipher Spec:
• Encryption Algorithm, Message Digest Algorithm, etc
– Master Secret: 48 Byte secret shared between the client
and the server
8
An X.509 Certificate
9
Data Transmission using SSL (SSL Record Protocol)
10
SSL Record Format
11
SSL Record Protocol
• 2 services:
– Confidentiality
• Using symmetric encryption with a shared secret key defined by
Handshake protocol
– Message integrity
• Using a MAC with a shared secret key
• Layered protocol:
– Fragmentation application data into blocks
– Compression
– MAC
– Encryption
– Transmit over TCP
12
SSL Record Protocol Payload
13
Handshake Protocol
• Establish security capabilities
– Protocol version, session ID, cipher suite,
compression method, IV
• Server authentication and key exchange
– Send certificate, key exchange, request client
certificate
• Client authentication and key exchange
– Send certificate, key exchange, certificate
verification
• Finish
14
SSL Change Cipher Spec Protocol
• one of 3 SSL specific protocols which use the
SSL Record protocol
• a single message
• causes pending state to become current
• hence updating the cipher suite in use
15
SSL Alert Protocol
• conveys SSL-related alerts to peer entity
• severity
• warning or fatal
• specific alert
• unexpected message, bad record mac, decompression
failure, handshake failure, illegal parameter
• close notify, no certificate, bad certificate, unsupported
certificate, certificate revoked, certificate expired,
certificate unknown
• compressed & encrypted like all SSL data
16
Master Secret Creation
• The master secret is a one-time 48-byte value
– A Pre-master key is exchanged first
• RSA or Diffie-Hellman
– Master secret is computed from the pre-master
secret, client random and server random
17
Generation of Cryptographic Parameters
• Session Key: Generated from the master
secret, client random, and server random
– Client write MAC secret
– Server write MAC secret
– Client Write Key
– Server Write Key
– Client Write IV
– Server Write IV
18
Application Ports used with SSL
19
Web Securities
20
How the Web Works - HTTP
• Hypertext transfer protocol (http).
• Clients request “documents” (or scripts)
through URL.
• Server response with “documents”.
• Stateless protocol, requests are
independent.
21
How the Web Works: Other Elements
• Hyper-text markup language (html).
• Other application specific document.
– e.g., MIME, graphics, video/audio, postscript, Java
applets, etc.
• Browsers.
– Display html documents and embedded graphics.
– Run Java program.
– Start helper applications.
– ...
22
Web Vulnerabilities
• http://www.w3.org/Security/Faq
• Revealing private information on server
• Intercept of client information
• Execute unauthorized programs
• Denial of service
• ...
23
Web Security
• Authentication:
– Basic (username, password)
• Can be used along with cookie
– Digest
• Access control via addresses
• Multi-layered:
– S-http (secure http), just for http
• Proposed by CommerceNet, pretty much dead
– SSL (TLS), generic for TCP
• https: http over SSL
– IPSec
24
HTTP Authentication - Basic
• Client doesn’t know which method
• Client attempts access (GET, PUT, …)
normally
• Server returns
– “401 unauthorized”
– Realm: protection space
• Client tries again with (user:password)
– Passwords in the clear
– Repeated for each access
25
From Basic Authentication to Forms and
Cookies
• Not all sites use basic authentication
• Many instead ask the user to type
username/password into a HTML form
• Server looks up the user and sends back a cookie
• The browser (client) resends the cookie on
subsequent requests
26
HTTP Access Control - Digest
• Server sends www-authenticate parameters:
– Realm
– Domain
– Nonce, new for each 401 response
• e.g.. H(client-IP:timestamp:server-secret)
– Algorithm
• e.g., MD5
27
HTTP Access Control - Digest
28
HTTP Access Control - Digest

More Related Content

PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PPTX
Secure Sockets Layer (SSL)
PPTX
Secure Socket Layer (SSL)
PPTX
group no 6.pptx
PPTX
Sequere socket Layer
PPT
SSL.ppt
SECURE SOCKET LAYER ( WEB SECURITY )
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
Secure Sockets Layer (SSL)
Secure Socket Layer (SSL)
group no 6.pptx
Sequere socket Layer
SSL.ppt

Similar to SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf (20)

PPT
SecureSocketLayer.ppt
PPT
Transport layer security.ppt
DOCX
What is TLS/SSL?
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
PPT
Introduction to Secure Sockets Layer
PPTX
Secure Socket Layer.pptx
PDF
BAIT1103 Chapter 4
PPSX
Secure socket layer
PPSX
Secure socket layer
PPT
Web securiy - Network security essentials
PPTX
Cryptography by Afroz haider mir
PPTX
Introduction to SSL and How to Exploit & Secure
PPT
Web security.ppt and Information Security introduction and management.pptx
PPT
ch16-Cryptography and Network Security.ppt
PPTX
1643129870-internet-security.pptx
PPTX
Internet security protocol
PPT
Transportsec
PPTX
ssl-tls-ipsec-vpn.pptx
PPTX
The last picks
PDF
Network Security Unit 4.pdf for BCA BBA.
SecureSocketLayer.ppt
Transport layer security.ppt
What is TLS/SSL?
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
Introduction to Secure Sockets Layer
Secure Socket Layer.pptx
BAIT1103 Chapter 4
Secure socket layer
Secure socket layer
Web securiy - Network security essentials
Cryptography by Afroz haider mir
Introduction to SSL and How to Exploit & Secure
Web security.ppt and Information Security introduction and management.pptx
ch16-Cryptography and Network Security.ppt
1643129870-internet-security.pptx
Internet security protocol
Transportsec
ssl-tls-ipsec-vpn.pptx
The last picks
Network Security Unit 4.pdf for BCA BBA.
Ad

More from NiharikaDubey17 (20)

PPTX
Information Security and Privacy-Unit-2.pptx
PPTX
Information Security and Privacy-Unit-1.pptx
PPTX
Digital Image Processing--Unit-3 - L2.pptx
PPTX
Digital Image Processing -Unit-3 - L1.pptx
PPTX
tableau-finalpresentation-161211155749.pptx
PPT
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
PPTX
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
PPTX
Knowledge Management with data warehouse-Unit-1-L5.pptx
PPTX
Knowledge Management with data mining detail-Unit-1-L6.pptx
PPT
intro on impact of Artificial Intelligence.ppt
PPT
chapter_1 C++ Programming introduction.ppt
PPT
Constraint_Satisfaction problem based_slides.ppt
PPT
18364_Conceptual dependency-scripts based content.ppt
PPTX
Business Intelligence And Business Decisions:.pptx
PPT
Decision based support system modelling.ppt
PPT
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
PPTX
researchconclavenitish-220715141929-be03069b (1).pptx
PPT
Circuit and Packet Switching Methods Presentation
PPT
Packet Switching Technique in Computer Network
PPT
ImageProcessing1-Introduction.ppt
Information Security and Privacy-Unit-2.pptx
Information Security and Privacy-Unit-1.pptx
Digital Image Processing--Unit-3 - L2.pptx
Digital Image Processing -Unit-3 - L1.pptx
tableau-finalpresentation-161211155749.pptx
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
Knowledge Management with data warehouse-Unit-1-L5.pptx
Knowledge Management with data mining detail-Unit-1-L6.pptx
intro on impact of Artificial Intelligence.ppt
chapter_1 C++ Programming introduction.ppt
Constraint_Satisfaction problem based_slides.ppt
18364_Conceptual dependency-scripts based content.ppt
Business Intelligence And Business Decisions:.pptx
Decision based support system modelling.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
researchconclavenitish-220715141929-be03069b (1).pptx
Circuit and Packet Switching Methods Presentation
Packet Switching Technique in Computer Network
ImageProcessing1-Introduction.ppt
Ad

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Project quality management in manufacturing
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
composite construction of structures.pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Foundation to blockchain - A guide to Blockchain Tech
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
additive manufacturing of ss316l using mig welding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Project quality management in manufacturing
CYBER-CRIMES AND SECURITY A guide to understanding
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
composite construction of structures.pdf
Construction Project Organization Group 2.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf

  • 2. 2 Transport Layer Security Protocols • Secure Socket Layer (SSL) – Originally designed to by Netscape to secure HTTP – Version 2 is being replaced by version 3 – Subsequently became Internet Standard known as TLS – Use TCP to provide a reliable end-to-end service – Application independent • Can be used for any application protocol: telnet, ftp.. • Transport Layer Security (TLS) – SSL 3.0 is very similar to TLS (RFC 2246)
  • 3. 3 Location of SSL • SSL is build on top of TCP • Provides a TCP like interface • In theory can be used by all type of applications in a transparent manner
  • 4. 4 SSL Architecture • Rely on TCP for a reliable communication • Two Layers – SSL Record Protocol provides basic security services – Handshake, change cipher spec, Alert..
  • 6. 6 SSL Session and Connection • Each SSL session can be used for multiple connections • SSL Session – An association between the client and the server – Are used to avoid negotiation of new security parameters for each connection • SSL Connection – A connection is a transport that provides a suitable type of service – Each connection is associated with one session
  • 7. 7 SSL Session • A SSL session consists of – Session ID – X.509 public-key certificate of peer (could be null) – Compression Algorithm – Cipher Spec: • Encryption Algorithm, Message Digest Algorithm, etc – Master Secret: 48 Byte secret shared between the client and the server
  • 9. 9 Data Transmission using SSL (SSL Record Protocol)
  • 11. 11 SSL Record Protocol • 2 services: – Confidentiality • Using symmetric encryption with a shared secret key defined by Handshake protocol – Message integrity • Using a MAC with a shared secret key • Layered protocol: – Fragmentation application data into blocks – Compression – MAC – Encryption – Transmit over TCP
  • 13. 13 Handshake Protocol • Establish security capabilities – Protocol version, session ID, cipher suite, compression method, IV • Server authentication and key exchange – Send certificate, key exchange, request client certificate • Client authentication and key exchange – Send certificate, key exchange, certificate verification • Finish
  • 14. 14 SSL Change Cipher Spec Protocol • one of 3 SSL specific protocols which use the SSL Record protocol • a single message • causes pending state to become current • hence updating the cipher suite in use
  • 15. 15 SSL Alert Protocol • conveys SSL-related alerts to peer entity • severity • warning or fatal • specific alert • unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter • close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown • compressed & encrypted like all SSL data
  • 16. 16 Master Secret Creation • The master secret is a one-time 48-byte value – A Pre-master key is exchanged first • RSA or Diffie-Hellman – Master secret is computed from the pre-master secret, client random and server random
  • 17. 17 Generation of Cryptographic Parameters • Session Key: Generated from the master secret, client random, and server random – Client write MAC secret – Server write MAC secret – Client Write Key – Server Write Key – Client Write IV – Server Write IV
  • 20. 20 How the Web Works - HTTP • Hypertext transfer protocol (http). • Clients request “documents” (or scripts) through URL. • Server response with “documents”. • Stateless protocol, requests are independent.
  • 21. 21 How the Web Works: Other Elements • Hyper-text markup language (html). • Other application specific document. – e.g., MIME, graphics, video/audio, postscript, Java applets, etc. • Browsers. – Display html documents and embedded graphics. – Run Java program. – Start helper applications. – ...
  • 22. 22 Web Vulnerabilities • http://www.w3.org/Security/Faq • Revealing private information on server • Intercept of client information • Execute unauthorized programs • Denial of service • ...
  • 23. 23 Web Security • Authentication: – Basic (username, password) • Can be used along with cookie – Digest • Access control via addresses • Multi-layered: – S-http (secure http), just for http • Proposed by CommerceNet, pretty much dead – SSL (TLS), generic for TCP • https: http over SSL – IPSec
  • 24. 24 HTTP Authentication - Basic • Client doesn’t know which method • Client attempts access (GET, PUT, …) normally • Server returns – “401 unauthorized” – Realm: protection space • Client tries again with (user:password) – Passwords in the clear – Repeated for each access
  • 25. 25 From Basic Authentication to Forms and Cookies • Not all sites use basic authentication • Many instead ask the user to type username/password into a HTML form • Server looks up the user and sends back a cookie • The browser (client) resends the cookie on subsequent requests
  • 26. 26 HTTP Access Control - Digest • Server sends www-authenticate parameters: – Realm – Domain – Nonce, new for each 401 response • e.g.. H(client-IP:timestamp:server-secret) – Algorithm • e.g., MD5