SlideShare a Scribd company logo
SECURING TCP
CONNECTIONS USING SSL
Presented By:
Raushan Mahaseth (2067/BEX/132)
Sagar Mali (2067/BEX/133)
Sanid Prajapati (2067/BEX/134)
Saugat Gautam (2067/BEX/135)
INTRODUCTION
• SSL stands for Secure Sockets Layer
• SSL is the standard security technology for establishing
an Encrypted link between a web server and a browser.
• This link ensures that all data passed between the web
servers and the browsers remain Private & Integral.
NEED of SSL
• Authentication of server
How does the client know who they are dealing with?
• Information Integrity
How do we know third party has not altered data en route?
OBJECTIVES of SSL PROTOCOL
• Data encryption
• Server authentication
• Message integrity
• Optional client authentication for aTCP/IP
connection.
Application of SSL in web browser:
An example
Normal HTTP: http://www.bbc.com
Secured HTTP: https://www.facebook.com
BRIEF HISTORY
• Netscape developed the SSL protocol in 1994, as a
response to the growing concern over the security on the
Internet.
• SSL was originally developed for the securing web
browser and server communications.
SSLVERSIONS
• There are several versions of the SSL protocol defined.
• The latest version ,Transport Layer Security Protocol (TLS) is
based on SSL 3.0
• SSL version 1.0
• SSL version 2.0
• SSL version 3.0
• TLS version 1.0
• TLS version 2.0 with SSL version 3.0 compatibility
Positioning of SSL layer in OSI model
Application
TCP
IP
Normal Application
Application
SSL
TCP
IP
Application with SSL
• SSL provides application programming interface (API)
to applications
• C and Java SSL libraries/classes readily available
SSL Protocol Stack
Composed ofTwo Layers:
1.Higher Layer
SSL Handshake Protocol
SSL Change Cipher Spec Protocol
SSL Alert Protocol
HTTP
2.Lower Layer
SSL Record Protocol,
TCP
IP
SSL Protocol StackTable
SSL Sub protocols
Two Sub protocols -
• Handshake Protocol: For establishing secure connection
• Record Protocol: For secure transmission of data
HANDSHAKE PROTOCOL
• Allows server & client to:
• authenticate each other
• to negotiate encryption, MAC algorithms and keys
• Comprises a series of messages exchanged in phases:
• Establish Security Capabilities
• Server Authentication and Key Exchange
• Client Authentication and Key Exchange
HANDSHAKE PROTOCOL EXPLAINED
Securing TCP connections using SSL
SSL Record Protocol
• The Record Protocol
1. takes an application message to be transmitted,
2. fragments the data into blocks,
3. compresses the data (optionally),
4. applies a MAC,
5. encrypts,
6. adds a header and
7. transmits the resulting unit.
SSL Record Protocol Operation
SUMMARY
• SSL protocol developed for secure internet browsing
• Operates in between Application andTransport layer
• Uses two sub protocol
• Handshake protocol
• Record protocol
• Widely applied by various servers and web browsers
REFERENCES
• Books:
• Computer Networks, A.S.Tatenbaum (Fourth Edition) PHI
• Computer Networking- A top down approach, J.F. Kurose &
K.W. Ross (Fifth Edition) Pearson
• Websites:
• http://en.wikipedia.org/wiki/Transport_Layer_Security
• http://www.webopedia.com/TERM/S/SSL.html
• https://www.globalsign.eu/ssl-information-center/what-is-ssl.html
• http://www.postgresql.org/docs/9.1/static/ssl-tcp.html
• http://www.digicert.com/ssl.htm
THANKYOU
AND
HAPPY
SECURE WEB BROWSING!

More Related Content

PPTX
Transport Layer Security (TLS)
PPTX
SSL TLS Protocol
PPSX
Secure socket layer
PPT
Introduction to Digital signatures
PPTX
Secure Socket Layer
PPTX
Cryptography.ppt
PPTX
secure socket layer
Transport Layer Security (TLS)
SSL TLS Protocol
Secure socket layer
Introduction to Digital signatures
Secure Socket Layer
Cryptography.ppt
secure socket layer

What's hot (20)

PPTX
Cryptography
PPT
Ssl (Secure Sockets Layer)
PPT
PPTX
Kerberos
PPTX
Secure Socket Layer
PPTX
Secure Socket Layer (SSL)
PPT
PUBLIC KEY ENCRYPTION
PDF
symmetric key encryption algorithms
PPTX
Key Management and Distribution
PPTX
Digital signature
PPT
Public Key Cryptography
PDF
SSL/TLS Handshake
PPTX
Cryptography
PPTX
Message digest 5
PPTX
Cryptographic algorithms
PPTX
TLS v1.3
PPT
Message authentication and hash function
PPTX
Hash Function
Cryptography
Ssl (Secure Sockets Layer)
Kerberos
Secure Socket Layer
Secure Socket Layer (SSL)
PUBLIC KEY ENCRYPTION
symmetric key encryption algorithms
Key Management and Distribution
Digital signature
Public Key Cryptography
SSL/TLS Handshake
Cryptography
Message digest 5
Cryptographic algorithms
TLS v1.3
Message authentication and hash function
Hash Function
Ad

Viewers also liked (20)

PPT
Secure Socket Layer
PPT
Introduction to Secure Sockets Layer
PPTX
Ssl (Secure Socket Layer)
PPT
SSL & TLS Architecture short
PDF
SSL/TLS
PPTX
Introduction to SSL and How to Exploit & Secure
PPTX
Introduction to SSL/TLS
PPTX
Transport Layer Security
PPT
Flow & Error Control
PPTX
TCP file upload server client example
PPTX
Riverbed Granite
DOC
Rm Resumev5 2 09
PPTX
SSL Layer
PDF
E-banking i sigurnost tehnickih rjesenja za Internet transakcije -presentation
PPT
02 protocols and tcp-ip
PDF
Enterprise & Media Storage in the Cloud
KEY
Publish and Subscribe
PDF
10 - Architetture Software - More architectural styles
PPTX
Architecture vs Design
PPTX
Publish subscribe model overview
Secure Socket Layer
Introduction to Secure Sockets Layer
Ssl (Secure Socket Layer)
SSL & TLS Architecture short
SSL/TLS
Introduction to SSL and How to Exploit & Secure
Introduction to SSL/TLS
Transport Layer Security
Flow & Error Control
TCP file upload server client example
Riverbed Granite
Rm Resumev5 2 09
SSL Layer
E-banking i sigurnost tehnickih rjesenja za Internet transakcije -presentation
02 protocols and tcp-ip
Enterprise & Media Storage in the Cloud
Publish and Subscribe
10 - Architetture Software - More architectural styles
Architecture vs Design
Publish subscribe model overview
Ad

Similar to Securing TCP connections using SSL (20)

PPTX
Secure Sockets Layer (SSL)
PPT
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
PPTX
Secure Socket Layer.pptx
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PPTX
Network Security- Secure Socket Layer
PPTX
Sequere socket Layer
PPTX
group no 6.pptx
PPT
Secure socket later
PPT
ssl
PPT
Secure Socket Layer.ppt [ssl for websecurity]
PPSX
Secure socket layer
PPT
SSL Protocol - R.D.Sivakumar
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PDF
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
PPTX
The last picks
DOCX
What is TLS/SSL?
PPT
Transport layer security.ppt
PPTX
Network and internet security
DOCX
SSL-image
PDF
BAIT1103 Chapter 4
Secure Sockets Layer (SSL)
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
Secure Socket Layer.pptx
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Network Security- Secure Socket Layer
Sequere socket Layer
group no 6.pptx
Secure socket later
ssl
Secure Socket Layer.ppt [ssl for websecurity]
Secure socket layer
SSL Protocol - R.D.Sivakumar
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
The last picks
What is TLS/SSL?
Transport layer security.ppt
Network and internet security
SSL-image
BAIT1103 Chapter 4

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
sap open course for s4hana steps from ECC to s4
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Securing TCP connections using SSL

  • 1. SECURING TCP CONNECTIONS USING SSL Presented By: Raushan Mahaseth (2067/BEX/132) Sagar Mali (2067/BEX/133) Sanid Prajapati (2067/BEX/134) Saugat Gautam (2067/BEX/135)
  • 2. INTRODUCTION • SSL stands for Secure Sockets Layer • SSL is the standard security technology for establishing an Encrypted link between a web server and a browser. • This link ensures that all data passed between the web servers and the browsers remain Private & Integral.
  • 3. NEED of SSL • Authentication of server How does the client know who they are dealing with? • Information Integrity How do we know third party has not altered data en route?
  • 4. OBJECTIVES of SSL PROTOCOL • Data encryption • Server authentication • Message integrity • Optional client authentication for aTCP/IP connection.
  • 5. Application of SSL in web browser: An example Normal HTTP: http://www.bbc.com Secured HTTP: https://www.facebook.com
  • 6. BRIEF HISTORY • Netscape developed the SSL protocol in 1994, as a response to the growing concern over the security on the Internet. • SSL was originally developed for the securing web browser and server communications.
  • 7. SSLVERSIONS • There are several versions of the SSL protocol defined. • The latest version ,Transport Layer Security Protocol (TLS) is based on SSL 3.0 • SSL version 1.0 • SSL version 2.0 • SSL version 3.0 • TLS version 1.0 • TLS version 2.0 with SSL version 3.0 compatibility
  • 8. Positioning of SSL layer in OSI model Application TCP IP Normal Application Application SSL TCP IP Application with SSL • SSL provides application programming interface (API) to applications • C and Java SSL libraries/classes readily available
  • 9. SSL Protocol Stack Composed ofTwo Layers: 1.Higher Layer SSL Handshake Protocol SSL Change Cipher Spec Protocol SSL Alert Protocol HTTP 2.Lower Layer SSL Record Protocol, TCP IP
  • 11. SSL Sub protocols Two Sub protocols - • Handshake Protocol: For establishing secure connection • Record Protocol: For secure transmission of data
  • 12. HANDSHAKE PROTOCOL • Allows server & client to: • authenticate each other • to negotiate encryption, MAC algorithms and keys • Comprises a series of messages exchanged in phases: • Establish Security Capabilities • Server Authentication and Key Exchange • Client Authentication and Key Exchange
  • 15. SSL Record Protocol • The Record Protocol 1. takes an application message to be transmitted, 2. fragments the data into blocks, 3. compresses the data (optionally), 4. applies a MAC, 5. encrypts, 6. adds a header and 7. transmits the resulting unit.
  • 16. SSL Record Protocol Operation
  • 17. SUMMARY • SSL protocol developed for secure internet browsing • Operates in between Application andTransport layer • Uses two sub protocol • Handshake protocol • Record protocol • Widely applied by various servers and web browsers
  • 18. REFERENCES • Books: • Computer Networks, A.S.Tatenbaum (Fourth Edition) PHI • Computer Networking- A top down approach, J.F. Kurose & K.W. Ross (Fifth Edition) Pearson • Websites: • http://en.wikipedia.org/wiki/Transport_Layer_Security • http://www.webopedia.com/TERM/S/SSL.html • https://www.globalsign.eu/ssl-information-center/what-is-ssl.html • http://www.postgresql.org/docs/9.1/static/ssl-tcp.html • http://www.digicert.com/ssl.htm