SlideShare a Scribd company logo
BABA GHULAM SHAH BADSHAH UNIVERSITY RAJOURI
Department of Computer Science and Applications
ROLL NO. 19-MCS-2015
Semester:- 5th
Course Title:- Cryptography And Network Security.
Presentation Topic:- Secure Sockets Layer (SSL)
1
WHAT IS SSL?
 SSL (Secure Sockets Layer) is a standard security
protocol for establishing encrypted links between a
web server and a browser in an online
communication.
 The usage of SSL technology ensures that all data
transmitted between the web server and browser
remains encrypted.
2
WHAT IS SSL?
 it provides a secure transport connection between
applications (e.g., a web server and a browser).
 SSL was developed by Netscape.
 SSL version 3.0 has been implemented in many web
browsers (e.g., Netscape Navigator and MS Internet
Explorer) and web servers and widely used on the
Internet.
 TLS can be viewed as SSL v3.1
3
Cont…
 This link ensures that all data passed between the
web server and browsers remain private and integral.
 It provide two basic security services
1) Authentication.
2) Confidentiality.
 It provide a secure pipeline between the web browser
and web server.
4
Cont...
 SSL provides users with a secure communication
channel for communication purpose between the
client and the server.
 It encrypt data packet at the sender’s end.
 When these data packet arrive at the destination
system, they decrypt to retrieve the original data.
 In short, SSL encrypt data at the sender’s end and
decrypt data at the receiver’s end.
5
Need of SSL
6
SSL HISTORY
 Netscape developed The Secure Sockets Layer
Protocol (SSL) in 1994, as a response to the growing
concern over security on the Internet.
 SSL was originally developed for securing web
browser and server communications.
7
SSL VERSION
 There are several versions of the SSL protocol defined.
 SSL Version
 SSL Version 1.0
 SSL Version 2.0
 SSL Version 3.0
 TLS Version 1.0
 TLS Version 1.0 with SSL Version 3.0 compatibility
8
Cont…
 The latest version, the Transport Layer Security
Protocol (TLS), is based on SSL 3.0
 Version 1.0 was never publicly released;
 version 2.0 was released in February 1995 but
"contained a number of security flaws which
ultimately led to the design of SSL version 3.0"
9
Position of SSL in TCP/IP
Application Layer
SSL Layer
Transport Layer
Internet Layer
Data Link Layer
Physical Layer
Fig. Position of SSL in
TCP/IP
• SSL can be conceptually
considered as an
additional layer in the
TCP/IP protocol suite.
• The SSL layer is located
between the application
layer and the transport
layer, as shown in Figure
10
L5 Data
L5 Data
L5 Data
L4 Data
L3 Data
0101010100010101010010
SH
H4
H2
H3
L5 Data
L5 Data
L5 Data
L4 Data
L3 Data
0101010100010101010010
SH
H4
H2
H3
Application
SSL
Transport
Internet
Data Link
Physical
Fig. SSL is located between application and transport layer
Transmission Medium
Cont…
X Y
11
How SSL Works?
 SSL has three sub-protocols, namely:
 The Handshake Protocol,
 The Record Protocol and
 The Alert Protocol.
12
Handshaking Protocol
 Protocol-allows server
and client to
authenticate negotiate
encryption algorithm
and cryptographic keys
Type Length Contents
Fig. Format of handshake protocol
message
1 byte 3 bytes 1 or more bytes
Indicate one of the ten
possible message types
Length of Message in
byte
Contain parameters
associated with the
message
13
Handshaking made up of Four Phases
14
Phase 1. Establishing Security Capabilities
Fig. Phase 1. Establishing Security Capabilities
• The first phase of SSL
handshake is used to
initiate a logical
connection and establish
the security capabilities
associated with that
connection
• This consists of two
message Client hello
and Server hello.
15
Phase 2 :-Server Authentication and key
exchange
 The server initiates this second phase of the SSL
handshake, and is the sole sender of all the messages
in the phase.
 The client is the sole recipient of all these message.
 This phase contain the four steps.
16
Phase 2. Server Authentication and key
exchange
Step 1. Certificates
Step 4. Server Hello done
Step 2. Server key exchange
Step 3. Certificate request
Web
Browse
r
Web
Server
17
Phase 3. Client Authentication and key exchange
Step 1. Certificate
Step 2. Client key exchange
Step 3. Certificate verify
Web
Browse
r
Web
Server
18
Phase 4. Finish
Step 1. Change of cipher
Step 2. Finish
Step 3 Change cipher specs
Step 4. Finish
Web
Server
Web
Browse
r
19
Record Protocol
 The record protocol came into picture after the
successful handshake is completed between client
and server.
 This protocol provides two services
1) Confidentiality:- This can be achieve by using
secret key that is defined by the handshake protocol
2) Integrity:- Handshake protocol also defines a
shared secret key that is used for assuring message
integrity.
20
Record Protocol
1. fragmentation. Each upper-layer
message is fragmented into blocks of 214
bytes (16384 bytes) or less.
2. Compression:- The fragmented
blocks are optionally compressed. The
compression process must not result into
the loss of data
3. Add MAC:- using the shared secret key
the message authentication code for
each block is calculated.
4. Encryption:- using the symmetric key
established previously in the handshake
protocol, the output of previous step is now
encrypted. This may not increases the overall
size of block.
5. Append Header:- Finally a header is
added to encrypted block.
21
Alert Protocol
 When client or server detects an error,
the detecting party sends an alert
message to the other party.
 If the error is fatal, both the parties
immediately close the SSL connection
 Other error, which are not serve, do not
result in the termination of the
connection.
Severity Cause
Byte 1
Byte
2
Fig. Alert Protocol
message format
• Each alert message consist of 2
bytes.
. If error is fatal, byte
contain 2.
Fist byte signifies the type of error.
If it is warning, this byte contain
1
22
Fatal alerts
Fatal alerts
 Unexpected message: An inappropriate message was received.
 Bad_record_mac: An incorrect MAC was received.
 Decompression_failure: function rerieved an improper input
 Handshake_failure:
23
No Fatal Alert/ Warning
No Fatal Alert/ Warning
• no_certificate:
• bad_certificate: received certificate was corrupt
• unsupported_certificate: The type of the received certificate is
not supported.
• certificate_expired:
• close_notify :alert before closing the write side of a connection.
24
SOURCES USED
 Cryptography and Network Security, Principles and
Practices, 4th Ed., William Stallings.
 Cryptography and Network Security, Atul kahate.
 www.wikipedia.com
 A few other internet resources
25
26

More Related Content

PPTX
Fundamental of Secure Socket Layer (SSL) | Part - 2
PPTX
Ssl (Secure Socket Layer)
PPTX
Secure Socket Layer (SSL)
PPTX
Web Security and SSL - Secure Socket Layer
PPTX
secure socket layer
PDF
Web Security
PPTX
Transport Layer Security (TLS)
Fundamental of Secure Socket Layer (SSL) | Part - 2
Ssl (Secure Socket Layer)
Secure Socket Layer (SSL)
Web Security and SSL - Secure Socket Layer
secure socket layer
Web Security
Transport Layer Security (TLS)

What's hot (19)

PPTX
Web Security
PPTX
SSL TLS Protocol
PPTX
Secure Socket Layer
PPTX
Securing TCP connections using SSL
PPTX
SSL Layer
PPTX
Transport layer security
PPTX
Secure Socket Layer
PPT
SSL Secure Socket Layer
PPTX
Introduction to SSL and How to Exploit & Secure
PPT
Introduction to Secure Sockets Layer
PPTX
The Fundamental of Secure Socket Layer (SSL)
PPT
Security
PPTX
TLS - Transport Layer Security
PDF
SSL Secure socket layer
PPTX
Internet security protocol
ODP
Tls 1.3
PPT
PPT
Ssl (Secure Sockets Layer)
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Web Security
SSL TLS Protocol
Secure Socket Layer
Securing TCP connections using SSL
SSL Layer
Transport layer security
Secure Socket Layer
SSL Secure Socket Layer
Introduction to SSL and How to Exploit & Secure
Introduction to Secure Sockets Layer
The Fundamental of Secure Socket Layer (SSL)
Security
TLS - Transport Layer Security
SSL Secure socket layer
Internet security protocol
Tls 1.3
Ssl (Secure Sockets Layer)
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Ad

Similar to Secure Sockets Layer (SSL) (20)

PPTX
Secure Socket Layer.pptx
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
PDF
Network Security_Module_2.pdf
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
Fundamental of Secure Socket Layer (SSl) | Part - 1
PDF
Vtu network security(10 ec832) unit 5 notes.
PPT
Web security
PPTX
Sequere socket Layer
PPTX
Network Security- Secure Socket Layer
PDF
VULNERABILITIES OF THE SSL/TLS PROTOCOL
PDF
Vulnerabilities of the SSL/TLS Protocol
PPTX
Parallel and distributed computing .pptx
PDF
Network Security_Module_2_Dr Shivashankar
PPT
Secure socket later
PDF
Improving the Secure Socket Layer by Modifying the RSA Algorithm
PPTX
1643129870-internet-security.pptx
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PPTX
Secure Socket Layer.pptx
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
Network Security_Module_2.pdf
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
SECURE SOCKET LAYER ( WEB SECURITY )
Fundamental of Secure Socket Layer (SSl) | Part - 1
Vtu network security(10 ec832) unit 5 notes.
Web security
Sequere socket Layer
Network Security- Secure Socket Layer
VULNERABILITIES OF THE SSL/TLS PROTOCOL
Vulnerabilities of the SSL/TLS Protocol
Parallel and distributed computing .pptx
Network Security_Module_2_Dr Shivashankar
Secure socket later
Improving the Secure Socket Layer by Modifying the RSA Algorithm
1643129870-internet-security.pptx
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf

Secure Sockets Layer (SSL)

  • 1. BABA GHULAM SHAH BADSHAH UNIVERSITY RAJOURI Department of Computer Science and Applications ROLL NO. 19-MCS-2015 Semester:- 5th Course Title:- Cryptography And Network Security. Presentation Topic:- Secure Sockets Layer (SSL) 1
  • 2. WHAT IS SSL?  SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication.  The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted. 2
  • 3. WHAT IS SSL?  it provides a secure transport connection between applications (e.g., a web server and a browser).  SSL was developed by Netscape.  SSL version 3.0 has been implemented in many web browsers (e.g., Netscape Navigator and MS Internet Explorer) and web servers and widely used on the Internet.  TLS can be viewed as SSL v3.1 3
  • 4. Cont…  This link ensures that all data passed between the web server and browsers remain private and integral.  It provide two basic security services 1) Authentication. 2) Confidentiality.  It provide a secure pipeline between the web browser and web server. 4
  • 5. Cont...  SSL provides users with a secure communication channel for communication purpose between the client and the server.  It encrypt data packet at the sender’s end.  When these data packet arrive at the destination system, they decrypt to retrieve the original data.  In short, SSL encrypt data at the sender’s end and decrypt data at the receiver’s end. 5
  • 7. SSL HISTORY  Netscape developed The Secure Sockets Layer Protocol (SSL) in 1994, as a response to the growing concern over security on the Internet.  SSL was originally developed for securing web browser and server communications. 7
  • 8. SSL VERSION  There are several versions of the SSL protocol defined.  SSL Version  SSL Version 1.0  SSL Version 2.0  SSL Version 3.0  TLS Version 1.0  TLS Version 1.0 with SSL Version 3.0 compatibility 8
  • 9. Cont…  The latest version, the Transport Layer Security Protocol (TLS), is based on SSL 3.0  Version 1.0 was never publicly released;  version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0" 9
  • 10. Position of SSL in TCP/IP Application Layer SSL Layer Transport Layer Internet Layer Data Link Layer Physical Layer Fig. Position of SSL in TCP/IP • SSL can be conceptually considered as an additional layer in the TCP/IP protocol suite. • The SSL layer is located between the application layer and the transport layer, as shown in Figure 10
  • 11. L5 Data L5 Data L5 Data L4 Data L3 Data 0101010100010101010010 SH H4 H2 H3 L5 Data L5 Data L5 Data L4 Data L3 Data 0101010100010101010010 SH H4 H2 H3 Application SSL Transport Internet Data Link Physical Fig. SSL is located between application and transport layer Transmission Medium Cont… X Y 11
  • 12. How SSL Works?  SSL has three sub-protocols, namely:  The Handshake Protocol,  The Record Protocol and  The Alert Protocol. 12
  • 13. Handshaking Protocol  Protocol-allows server and client to authenticate negotiate encryption algorithm and cryptographic keys Type Length Contents Fig. Format of handshake protocol message 1 byte 3 bytes 1 or more bytes Indicate one of the ten possible message types Length of Message in byte Contain parameters associated with the message 13
  • 14. Handshaking made up of Four Phases 14
  • 15. Phase 1. Establishing Security Capabilities Fig. Phase 1. Establishing Security Capabilities • The first phase of SSL handshake is used to initiate a logical connection and establish the security capabilities associated with that connection • This consists of two message Client hello and Server hello. 15
  • 16. Phase 2 :-Server Authentication and key exchange  The server initiates this second phase of the SSL handshake, and is the sole sender of all the messages in the phase.  The client is the sole recipient of all these message.  This phase contain the four steps. 16
  • 17. Phase 2. Server Authentication and key exchange Step 1. Certificates Step 4. Server Hello done Step 2. Server key exchange Step 3. Certificate request Web Browse r Web Server 17
  • 18. Phase 3. Client Authentication and key exchange Step 1. Certificate Step 2. Client key exchange Step 3. Certificate verify Web Browse r Web Server 18
  • 19. Phase 4. Finish Step 1. Change of cipher Step 2. Finish Step 3 Change cipher specs Step 4. Finish Web Server Web Browse r 19
  • 20. Record Protocol  The record protocol came into picture after the successful handshake is completed between client and server.  This protocol provides two services 1) Confidentiality:- This can be achieve by using secret key that is defined by the handshake protocol 2) Integrity:- Handshake protocol also defines a shared secret key that is used for assuring message integrity. 20
  • 21. Record Protocol 1. fragmentation. Each upper-layer message is fragmented into blocks of 214 bytes (16384 bytes) or less. 2. Compression:- The fragmented blocks are optionally compressed. The compression process must not result into the loss of data 3. Add MAC:- using the shared secret key the message authentication code for each block is calculated. 4. Encryption:- using the symmetric key established previously in the handshake protocol, the output of previous step is now encrypted. This may not increases the overall size of block. 5. Append Header:- Finally a header is added to encrypted block. 21
  • 22. Alert Protocol  When client or server detects an error, the detecting party sends an alert message to the other party.  If the error is fatal, both the parties immediately close the SSL connection  Other error, which are not serve, do not result in the termination of the connection. Severity Cause Byte 1 Byte 2 Fig. Alert Protocol message format • Each alert message consist of 2 bytes. . If error is fatal, byte contain 2. Fist byte signifies the type of error. If it is warning, this byte contain 1 22
  • 23. Fatal alerts Fatal alerts  Unexpected message: An inappropriate message was received.  Bad_record_mac: An incorrect MAC was received.  Decompression_failure: function rerieved an improper input  Handshake_failure: 23
  • 24. No Fatal Alert/ Warning No Fatal Alert/ Warning • no_certificate: • bad_certificate: received certificate was corrupt • unsupported_certificate: The type of the received certificate is not supported. • certificate_expired: • close_notify :alert before closing the write side of a connection. 24
  • 25. SOURCES USED  Cryptography and Network Security, Principles and Practices, 4th Ed., William Stallings.  Cryptography and Network Security, Atul kahate.  www.wikipedia.com  A few other internet resources 25
  • 26. 26