SlideShare a Scribd company logo
2
Most read
4
Most read
22
Most read
Ssl https
Presentation plan
 What is HTTP?
Presentation plan
 What is SSL?
What is SSL?
 Secure Sockets Layer (SSL) is a computer networking protocol for securing
connections between network application clients and servers over an insecure
network, such as the internet, due to numerous protocol and implementation
flaws and vulnerabilities
 SSL was originally specified in the 1990s as a proprietary protocol that
allowed Netscape browser clients using the Hypertext Transfer Protocol
(HTTP) to communicate securely with Netscape web servers. SSL eventually
came to be used to secure authentication and encryption for communication
at the network transport layer.
Netscape Communications was a computer services company best known for its Web browser, Navigator.
Navigator was one of the two most popular Web browsers in the 1990s.
Presentation plan
 What is SSL?
 How does SSL work?
How does SSL work?
 SSL runs above the transport layer and the network layer, which are
responsible for the transport of data between processes and the routing of
network traffic over a network between client and server, respectively, and
below application layer protocols such as HTTP and the SMTP (Simple Mail
Transport Protocol).
 The "sockets" part of the term refers to the sockets method of passing data
between a client and a server program in a network, or between processes in
the same computer.
How does SSL work?
SSL uses a combination
of public key and
symmetric key encryption
to secure a connection
between two machines,
typically a web or mail
server and a client system,
communicating over
the internet or
another TCP/IP network.
How does SSL work?
The SSL protocol includes two subprotocols:
the record protocol
the "handshake" protocol.
The record protocol
• The record protocol defines how communicating hosts exchange data using
SSL, including specifications for how data is to be prepared for transmission
and how it is to be verified or decrypted on receipt.
The handshake protocol
•The handshake protocol defines how a client and server establish an SSL
connection, including the negotiation of which cryptographic systems each host
is willing (or unwilling) to use for communication, as well as the exchange of
cryptographic material, such as public keys and session keys for encryption or
authentication of transmitted data.
How does SSL work?
 Once the server has been authenticated, the client and server
establish cipher settings and a shared key to encrypt the information they
exchange during the remainder of the session. This provides data
confidentiality and integrity.
How does SSL work?
 This whole process is invisible to the user. For example, if a webpage requires
an SSL connection, the URL will change from HTTP to HTTPS, and a padlock
icon will appear in the browser once the server has been authenticated.
How does SSL work?
•The handshake also allows the client to authenticate itself to the server. In this
case, after server authentication is complete, the client must present its
certificate to the server to authenticate the client's identity before the
encrypted SSL session can be established.
Presentation plan
 What is HTTP?
 What is SSL?
 How does SSL work?
 What is TSL?
What is TSL?
 After the IETF officially took over the SSL protocol to standardize it through
an open process, version 3.1 of SSL was released as TLS 1.0.
What is SSL?
 SSL was deprecated for use on the internet by the Internet Engineering Task Force
(IETF) in 2015 and has been replaced by the Transport Layer Security (TLS) protocol.
While TLS and SSL are not interoperable, TLS is backwards-compatible with SSL 3.0.
What is TSL?
 Many attacks against SSL have focused on SSL implementation issues, but
the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability
is a known flaw in the SSL 3.0 protocol itself, exploiting the way in which it
ignores padding bytes when running in cipher block chaining mode.
 This flaw allows an attacker to decrypt sensitive information, such as
authentication cookies. TLS 1.0 is not vulnerable to this attack because it
specifies that all padding bytes must have the same value and must be
verified.
What is TSL?
 Other key differences between SSL and TLS that make TLS a more secure and
efficient protocol are:
 message authentication,
 key material generation,
 cipher suites, TLS supporting newer and more secure algorithms.
 TLS 1.2 is the most recent version, but publication of the next version is
expected to be approved in 2017; the update is likely to be called either TLS
1.3 or TLS 2.0.
Presentation plan
 What is SSL?
 How does SSL work?
 What is TSL?
 What is HTTP?
What is HTTP?
 HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files
(text, graphic images, sound, video, and other multimedia files) on the World
Wide Web. As soon as a Web user opens their Web browser, the user is
indirectly making use of HTTP. HTTP is an application protocol that runs on
top of the TCP/IP suite of protocols (the foundation protocols for the
Internet).
 HTTP concepts include the idea that files can contain references to other
files whose selection will elicit additional transfer requests. Any Web
server machine contains, in addition to the Web page files it can serve, an
HTTP daemon, a program that is designed to wait for HTTP requests and
handle them when they arrive.
What is HTTP?
 The Web browser is an HTTP client, sending requests to server machines.
When the browser user enters file requests by either "opening" a Web file
(typing in a Uniform Resource Locator or URL) or clicking on a hypertext link,
the browser builds an HTTP request and sends it to the Internet Protocol
address (IP address) indicated by the URL.
 The HTTP daemon in the destination server machine receives the request and
sends back the requested file or files associated with the request. (A Web
page often consists of more than one file.)
What is HTTPS?
HTTP + SSL/TSL = HTTPS (Hypertext Transfer Protocol Secure)
Thank you for your attention

More Related Content

PPTX
SSL TLS Protocol
PPT
Secure Socket Layer (SSL)
PPTX
kerberos
PDF
SSL intro
PPTX
Secure Socket Layer
PPTX
Kerberos
SSL TLS Protocol
Secure Socket Layer (SSL)
kerberos
SSL intro
Secure Socket Layer
Kerberos

What's hot (20)

PPT
Secure Socket Layer
PDF
SSL/TLS Handshake
PPTX
Ssl in a nutshell
PDF
Kerberos
PDF
PPTX
TLS - Transport Layer Security
PPTX
SSL/TLS
PDF
Email security presentation
PPTX
Transport Layer Security (TLS)
PPTX
Secure SHell
PPTX
Secure Socket Layer (SSL)
PPTX
secure socket layer
PPSX
Secure socket layer
PPTX
HTTPS
PPTX
HTTP vs HTTPS Difference
PPT
Pretty good privacy
PPTX
Transport layer security (tls)
PPTX
TLS v1.3
PPTX
Kerberos explained
Secure Socket Layer
SSL/TLS Handshake
Ssl in a nutshell
Kerberos
TLS - Transport Layer Security
SSL/TLS
Email security presentation
Transport Layer Security (TLS)
Secure SHell
Secure Socket Layer (SSL)
secure socket layer
Secure socket layer
HTTPS
HTTP vs HTTPS Difference
Pretty good privacy
Transport layer security (tls)
TLS v1.3
Kerberos explained
Ad

Similar to Ssl https (20)

DOCX
Explain how SSL protocol is used to ensure the confidentiality and int.docx
PPTX
Http Vs Https .
DOCX
Best Web Protocols Course in excellence technology
PDF
BAIT1103 Chapter 4
PDF
Differences to Know Between SSL & TLS certificate .pdf
PPTX
Ssl and tls
PPTX
Sequere socket Layer
PDF
Http vs https
PDF
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
PPTX
Understanding-Web-Communication-HTTP-vs-HTTPS.pptx
PDF
Secure Sockets Layer(SSL)Certificate
DOCX
application layer
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PPTX
internet protocol
PDF
Geek Guide: Apache Web Servers and SSL Authentication
PPTX
Tcp and udp ports
DOCX
What is TLS/SSL?
PPTX
PPTX
ION Sri Lanka - TLS for Network Operators
PPTX
HTTP.pptx...............................
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Http Vs Https .
Best Web Protocols Course in excellence technology
BAIT1103 Chapter 4
Differences to Know Between SSL & TLS certificate .pdf
Ssl and tls
Sequere socket Layer
Http vs https
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Understanding-Web-Communication-HTTP-vs-HTTPS.pptx
Secure Sockets Layer(SSL)Certificate
application layer
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
internet protocol
Geek Guide: Apache Web Servers and SSL Authentication
Tcp and udp ports
What is TLS/SSL?
ION Sri Lanka - TLS for Network Operators
HTTP.pptx...............................
Ad

Recently uploaded (20)

PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
innovation process that make everything different.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Introduction to the IoT system, how the IoT system works
DOCX
Unit-3 cyber security network security of internet system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
innovation process that make everything different.pptx
Power Point - Lesson 3_2.pptx grad school presentation
Sims 4 Historia para lo sims 4 para jugar
Slides PDF The World Game (s) Eco Economic Epochs.pdf
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Unit-1 introduction to cyber security discuss about how to secure a system
Design_with_Watersergyerge45hrbgre4top (1).ppt
Tenda Login Guide: Access Your Router in 5 Easy Steps
Cloud-Scale Log Monitoring _ Datadog.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
RPKI Status Update, presented by Makito Lay at IDNOG 10
introduction about ICD -10 & ICD-11 ppt.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
Introduction to the IoT system, how the IoT system works
Unit-3 cyber security network security of internet system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso

Ssl https

  • 4. What is SSL?  Secure Sockets Layer (SSL) is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet, due to numerous protocol and implementation flaws and vulnerabilities  SSL was originally specified in the 1990s as a proprietary protocol that allowed Netscape browser clients using the Hypertext Transfer Protocol (HTTP) to communicate securely with Netscape web servers. SSL eventually came to be used to secure authentication and encryption for communication at the network transport layer. Netscape Communications was a computer services company best known for its Web browser, Navigator. Navigator was one of the two most popular Web browsers in the 1990s.
  • 5. Presentation plan  What is SSL?  How does SSL work?
  • 6. How does SSL work?  SSL runs above the transport layer and the network layer, which are responsible for the transport of data between processes and the routing of network traffic over a network between client and server, respectively, and below application layer protocols such as HTTP and the SMTP (Simple Mail Transport Protocol).  The "sockets" part of the term refers to the sockets method of passing data between a client and a server program in a network, or between processes in the same computer.
  • 7. How does SSL work? SSL uses a combination of public key and symmetric key encryption to secure a connection between two machines, typically a web or mail server and a client system, communicating over the internet or another TCP/IP network.
  • 8. How does SSL work? The SSL protocol includes two subprotocols: the record protocol the "handshake" protocol.
  • 9. The record protocol • The record protocol defines how communicating hosts exchange data using SSL, including specifications for how data is to be prepared for transmission and how it is to be verified or decrypted on receipt.
  • 10. The handshake protocol •The handshake protocol defines how a client and server establish an SSL connection, including the negotiation of which cryptographic systems each host is willing (or unwilling) to use for communication, as well as the exchange of cryptographic material, such as public keys and session keys for encryption or authentication of transmitted data.
  • 11. How does SSL work?  Once the server has been authenticated, the client and server establish cipher settings and a shared key to encrypt the information they exchange during the remainder of the session. This provides data confidentiality and integrity.
  • 12. How does SSL work?  This whole process is invisible to the user. For example, if a webpage requires an SSL connection, the URL will change from HTTP to HTTPS, and a padlock icon will appear in the browser once the server has been authenticated.
  • 13. How does SSL work? •The handshake also allows the client to authenticate itself to the server. In this case, after server authentication is complete, the client must present its certificate to the server to authenticate the client's identity before the encrypted SSL session can be established.
  • 14. Presentation plan  What is HTTP?  What is SSL?  How does SSL work?  What is TSL?
  • 15. What is TSL?  After the IETF officially took over the SSL protocol to standardize it through an open process, version 3.1 of SSL was released as TLS 1.0.
  • 16. What is SSL?  SSL was deprecated for use on the internet by the Internet Engineering Task Force (IETF) in 2015 and has been replaced by the Transport Layer Security (TLS) protocol. While TLS and SSL are not interoperable, TLS is backwards-compatible with SSL 3.0.
  • 17. What is TSL?  Many attacks against SSL have focused on SSL implementation issues, but the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability is a known flaw in the SSL 3.0 protocol itself, exploiting the way in which it ignores padding bytes when running in cipher block chaining mode.  This flaw allows an attacker to decrypt sensitive information, such as authentication cookies. TLS 1.0 is not vulnerable to this attack because it specifies that all padding bytes must have the same value and must be verified.
  • 18. What is TSL?  Other key differences between SSL and TLS that make TLS a more secure and efficient protocol are:  message authentication,  key material generation,  cipher suites, TLS supporting newer and more secure algorithms.  TLS 1.2 is the most recent version, but publication of the next version is expected to be approved in 2017; the update is likely to be called either TLS 1.3 or TLS 2.0.
  • 19. Presentation plan  What is SSL?  How does SSL work?  What is TSL?  What is HTTP?
  • 20. What is HTTP?  HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols (the foundation protocols for the Internet).  HTTP concepts include the idea that files can contain references to other files whose selection will elicit additional transfer requests. Any Web server machine contains, in addition to the Web page files it can serve, an HTTP daemon, a program that is designed to wait for HTTP requests and handle them when they arrive.
  • 21. What is HTTP?  The Web browser is an HTTP client, sending requests to server machines. When the browser user enters file requests by either "opening" a Web file (typing in a Uniform Resource Locator or URL) or clicking on a hypertext link, the browser builds an HTTP request and sends it to the Internet Protocol address (IP address) indicated by the URL.  The HTTP daemon in the destination server machine receives the request and sends back the requested file or files associated with the request. (A Web page often consists of more than one file.)
  • 22. What is HTTPS? HTTP + SSL/TSL = HTTPS (Hypertext Transfer Protocol Secure)
  • 23. Thank you for your attention