SlideShare a Scribd company logo
SSL/TLS
Agenda
• History
• Lifecycle of a web request
• HTTP Request Handshake
• Encryption
• What is SSL/TLS
• Certificate Authorities
• TLS Resumption
• How it works
• Vulnerabilities
History
• The SSL protocol was originally developed at Netscape.
• To enable ecommerce transaction security on the web, which
required
• Encryption to protect customer's personal data
• Authentication
• Integrity guarantees to ensure a safe transaction.

• Evolved from SSL 1.0,2.0,3.0 in to TLS
• When SSL protocol is standardized by IETF, it was renamed to
Transport Layer Security(TLS). TLS 1.0 is an upgrade to SSL 3.0
SSL/TLS
HTTP Request Handshake
• SYN - (Synchronize) Initiates a connection
• FIN - (Final) Cleanly terminates a connection
• ACK – Acknowledges received data

Problems :
• Clear text
• Unsecured
• No encryption
• No certificates required
SSL/TLS
Message Authentication Code
What is SSL
• Intermediate layer between transport and security
• It provides following services
• Encryption
• Authentication
• Integrity
Certificate Authorities
• A certificate authority (CA) is a trusted third party that is trusted by both the subject
(owner) of the certificate and the party relying upon the certificate.
• The browser specifies which CAs to trust (root CAs), and the burden is then on the CAs to
verify each site they sign, and to audit and verify that these certificates are not misused
or compromised. If the security of any site with the CA’s certificate is breached, then it
is also the responsibility of that CA to revoke the compromised certificate.
How it works
Before the client and the server can begin
exchanging application data over TLS, the
encrypted tunnel must be negotiated, the
client and server must agree on
• The version of the TLS protocol
• Choose Cipher suite
• Verify certificate if necessary
TLS Session Resumption
• TLS provides an ability to resume or
share the same negotiated secret key
data between multiple connections.
• This is achieved by using session
identifier created in earlier TLS
handshake.
• Client sends the session identifier to
server in ClientHello message. If server
recognizes the client session Id,
previous cipher suite and MAC can be
reused.

• Stateless Resumption : Session tickets
can be generated by the server with all
session information and can be sent to
client during TLS handshake.
Vulnerabilities
• Man in the middle attack(MITM)
• DNS Hijacking
• CA Private Key is
compromised

More Related Content

PPTX
Ssl in a nutshell
PPTX
SSL TLS Protocol
PPTX
Secure Socket Layer
PDF
SSL intro
PPTX
Transport Layer Security (TLS)
PDF
Authenticated Encryption Gcm Ccm
PPT
Ssl in a nutshell
SSL TLS Protocol
Secure Socket Layer
SSL intro
Transport Layer Security (TLS)
Authenticated Encryption Gcm Ccm

What's hot (20)

PPT
Ssl (Secure Sockets Layer)
PPT
Ssl https
PPTX
TLS - Transport Layer Security
PPTX
SSL And TLS
PPTX
Secure Socket Layer
PPTX
HTTP & HTTPS
PPTX
Secure Socket Layer (SSL)
PPT
Introduction to Secure Sockets Layer
PDF
SSL/TLS Handshake
PPTX
secure socket layer
PDF
Socket.IO
PPTX
Transport layer security
ODP
Https presentation
PPTX
Transport Layer Security
PPT
Secure Socket Layer (SSL)
ODP
OAuth2 - Introduction
PPTX
Transport Layer Security
Ssl (Secure Sockets Layer)
Ssl https
TLS - Transport Layer Security
SSL And TLS
Secure Socket Layer
HTTP & HTTPS
Secure Socket Layer (SSL)
Introduction to Secure Sockets Layer
SSL/TLS Handshake
secure socket layer
Socket.IO
Transport layer security
Https presentation
Transport Layer Security
Secure Socket Layer (SSL)
OAuth2 - Introduction
Transport Layer Security
Ad

Similar to SSL/TLS (20)

PPT
cryptography and network security thid.ppt
PPTX
Certificate pinning in android applications
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PDF
BAIT1103 Chapter 4
PPTX
TLS/SSL - Study of Secured Communications
PDF
CNIT 141: 13. TLS
PPT
ch1 eriht eriotery erogyteip ergy7.ppt
PPT
chap17 computer and programming in cpp.ppt
PDF
Webinar SSL English
PDF
CNIT 141: 13. TLS
PDF
CNIT 141 13. TLS
PPT
Unit -- 5.ppt
PDF
Understanding transport-layer_security__ssl
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
PPTX
Transport layer security computer network.pptx
DOCX
What is TLS/SSL?
PDF
Details about the SSL Certificate
PPT
ch17.ppt
PPTX
The last picks
PPTX
All you need to know about transport layer security
cryptography and network security thid.ppt
Certificate pinning in android applications
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
BAIT1103 Chapter 4
TLS/SSL - Study of Secured Communications
CNIT 141: 13. TLS
ch1 eriht eriotery erogyteip ergy7.ppt
chap17 computer and programming in cpp.ppt
Webinar SSL English
CNIT 141: 13. TLS
CNIT 141 13. TLS
Unit -- 5.ppt
Understanding transport-layer_security__ssl
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
Transport layer security computer network.pptx
What is TLS/SSL?
Details about the SSL Certificate
ch17.ppt
The last picks
All you need to know about transport layer security
Ad

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

SSL/TLS

  • 2. Agenda • History • Lifecycle of a web request • HTTP Request Handshake • Encryption • What is SSL/TLS • Certificate Authorities • TLS Resumption • How it works • Vulnerabilities
  • 3. History • The SSL protocol was originally developed at Netscape. • To enable ecommerce transaction security on the web, which required • Encryption to protect customer's personal data • Authentication • Integrity guarantees to ensure a safe transaction. • Evolved from SSL 1.0,2.0,3.0 in to TLS • When SSL protocol is standardized by IETF, it was renamed to Transport Layer Security(TLS). TLS 1.0 is an upgrade to SSL 3.0
  • 5. HTTP Request Handshake • SYN - (Synchronize) Initiates a connection • FIN - (Final) Cleanly terminates a connection • ACK – Acknowledges received data Problems : • Clear text • Unsecured • No encryption • No certificates required
  • 8. What is SSL • Intermediate layer between transport and security • It provides following services • Encryption • Authentication • Integrity
  • 9. Certificate Authorities • A certificate authority (CA) is a trusted third party that is trusted by both the subject (owner) of the certificate and the party relying upon the certificate. • The browser specifies which CAs to trust (root CAs), and the burden is then on the CAs to verify each site they sign, and to audit and verify that these certificates are not misused or compromised. If the security of any site with the CA’s certificate is breached, then it is also the responsibility of that CA to revoke the compromised certificate.
  • 10. How it works Before the client and the server can begin exchanging application data over TLS, the encrypted tunnel must be negotiated, the client and server must agree on • The version of the TLS protocol • Choose Cipher suite • Verify certificate if necessary
  • 11. TLS Session Resumption • TLS provides an ability to resume or share the same negotiated secret key data between multiple connections. • This is achieved by using session identifier created in earlier TLS handshake. • Client sends the session identifier to server in ClientHello message. If server recognizes the client session Id, previous cipher suite and MAC can be reused. • Stateless Resumption : Session tickets can be generated by the server with all session information and can be sent to client during TLS handshake.
  • 12. Vulnerabilities • Man in the middle attack(MITM) • DNS Hijacking • CA Private Key is compromised

Editor's Notes

  • #4: Datagram TLS is for UDP
  • #9: Encryption A mechanism to obfuscate what is sent from one computer to another.Authentication A mechanism to verify the validity of provided identification material.Integrity A mechanism to detect message tampering and forgery.
  • #11: The ingenious part of this handshake, and the reason TLS works in practice, is its use of public key cryptography (also known as asymmetric key cryptography), which allows the peers to negotiate a shared secret key without having to establish any prior knowledge of each other, and to do so over an unencrypted channel.As part of the TLS handshake, the protocol also allows both connection peers to authenticate their identity. When used in the browser, this authentication mechanism allows the client to verify that the server is who it claims to be (e.g., your bank) and not someone simply pretending to be the destination by spoofing its name or IP address. This verification is based on the established chain of trust. In addition, the server can also optionally verify the identity of the client—e.g., a company proxy server can authenticate all employees, each of whom could have his own unique certificate signed by the company. Finally, with encryption and authentication in place, the TLS protocol also provides its own message framing mechanism and signs each message with a message authentication code (MAC). The MAC algorithm is a one-way cryptographic hash function (effectively a checksum), the keys to which are negotiated by both connection peers. Whenever a TLS record is sent, a MAC value is generated and appended for that message, and the receiver is then able to compute and verify the sent MAC value to ensure message integrity and authenticity.
  • #12: In practice, most web applications attempt to establish multiple connections to the same host to fetch resources in parallel, which makessession resumption a must-have optimization to reduce latency and computational costs for both sides. Most modern browsers intentionally wait for the first TLS connection to complete before opening new connections to the same server. subsequent TLS connections can reuse the SSL session parameters toavoid the costly handshake.