SlideShare a Scribd company logo
3
Most read
12
Most read
23
Most read
Socket Layer Security
In this Presentation:
 need for web security
 SSL/TLS transport layer security protocols
 HTTPS
 secure shell (SSH)
Web Security
 Web now widely used by business, government,
individuals
 but Internet & Web are vulnerable
 have a variety of threats
 integrity
 confidentiality
 denial of service
 authentication
 need added security mechanisms
Web Traffic Security Approaches
SSL (Secure Socket Layer)
 transport layer security service
 originally developed by Netscape
 version 3 designed with public input
 subsequently became Internet standard known as TLS
(Transport Layer Security)
 uses TCP to provide a reliable end-to-end service
 SSL has two layers of protocols
SSL Architecture
SSL Architecture
 SSL connection
 a transient, peer-to-peer, communications link
 associated with 1 SSL session
 SSL session
 an association between client & server
 created by the Handshake Protocol
 define a set of cryptographic parameters
 may be shared by multiple SSL connections
SSL Record Protocol Services
 confidentiality
 using symmetric encryption with a shared secret key
defined by Handshake Protocol
 AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-
40, RC4-128
 message is compressed before encryption
 message integrity
 using a MAC with shared secret key
 similar to HMAC but with different padding
SSL Record Protocol Operation
SSL Change Cipher Spec Protocol
 one of 3 SSL specific protocols which use the SSL
Record protocol
 a single message
 causes pending state to become current
 hence updating the cipher suite in use
SSL Alert Protocol
 conveys SSL-related alerts to peer entity
 severity
 warning or fatal
 specific alert
 fatal: unexpected message, bad record mac, decompression
failure, handshake failure, illegal parameter
 warning: close notify, no certificate, bad certificate,
unsupported certificate, certificate revoked, certificate
expired, certificate unknown
 compressed & encrypted like all SSL data
SSL Handshake Protocol
 allows server & client to:
 authenticate each other
 to negotiate encryption & MAC algorithms
 to negotiate cryptographic keys to be used
 comprises a series of messages in phases
1. Establish Security Capabilities
2. Server Authentication and Key Exchange
3. Client Authentication and Key Exchange
4. Finish
SSL
Handshake
Protocol
Cryptographic Computations
 master secret creation
 a one-time 48-byte value
 generated using secure key exchange (RSA / Diffie-
Hellman) and then hashing info
 generation of cryptographic parameters
 client write MAC secret, a server write MAC secret, a
client write key, a server write key, a client write IV, and a
server write IV
 generated by hashing master secret
TLS (Transport Layer Security)
 IETF standard RFC 2246 similar to SSLv3
 with minor differences
 in record format version number
 uses HMAC for MAC
 a pseudo-random function expands secrets
 based on HMAC using SHA-1 or MD5
 has additional alert codes
 some changes in supported ciphers
 changes in certificate types & negotiations
 changes in crypto computations & padding
HTTPS
 HTTPS (HTTP over SSL)
 combination of HTTP & SSL/TLS to secure
communications between browser & server
 documented in RFC2818
 no fundamental change using either SSL or TLS
 use https:// URL rather than http://
 and port 443 rather than 80
 encrypts
 URL, document contents, form data, cookies, HTTP
headers
HTTPS Use
 connection initiation
 TLS handshake then HTTP request(s)
 connection closure
 have “Connection: close” in HTTP record
 TLS level exchange close_notify alerts
 can then close TCP connection
 must handle TCP close before alert exchange sent or
completed
Secure Shell (SSH)
 protocol for secure network communications
 designed to be simple & inexpensive
 SSH1 provided secure remote logon facility
 replace TELNET & other insecure schemes
 also has more general client/server capability
 SSH2 fixes a number of security flaws
 documented in RFCs 4250 through 4254
 SSH clients & servers are widely available
 method of choice for remote login/ X tunnels
SSH Protocol Stack
SSH Transport Layer Protocol
 server authentication occurs at transport layer, based
on server/host key pair(s)
 server authentication requires clients to know host keys
in advance
 packet exchange
 establish TCP connection
 can then exchange data
 identification string exchange, algorithm negotiation, key
exchange, end of key exchange, service request
 using specified packet format
SSH User Authentication Protocol
 authenticates client to server
 three message types:
 SSH_MSG_USERAUTH_REQUEST
 SSH_MSG_USERAUTH_FAILURE
 SSH_MSG_USERAUTH_SUCCESS
 authentication methods used
 public-key, password, host-based
SSH Connection Protocol
 runs on SSH Transport Layer Protocol
 assumes secure authentication connection
 used for multiple logical channels
 SSH communications use separate channels
 either side can open with unique id number
 flow controlled
 have three stages:
 opening a channel, data transfer, closing a channel
 four types:
 session, x11, forwarded-tcpip, direct-tcpip.
SSH
Connection
Protocol
Exchange
Port Forwarding
 convert insecure TCP connection into a secure SSH
connection
 SSH Transport Layer Protocol establishes a TCP
connection between SSH client & server
 client traffic redirected to local SSH, travels via tunnel,
then remote SSH delivers to server
 supports two types of port forwarding
 local forwarding – hijacks selected traffic
 remote forwarding – client acts for server

More Related Content

PPTX
RSA Algorithm
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
SHA- Secure hashing algorithm
PPT
Network security cryptographic hash function
PPTX
Public Key Cryptography
PPT
Secure Socket Layer
PPT
Classical Encryption Techniques in Network Security
RSA Algorithm
Cryptography and Network Security William Stallings Lawrie Brown
SHA- Secure hashing algorithm
Network security cryptographic hash function
Public Key Cryptography
Secure Socket Layer
Classical Encryption Techniques in Network Security

What's hot (20)

PPT
Message authentication
 
PDF
2. public key cryptography and RSA
PDF
IP Security
PPT
Pretty good privacy
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
RSA ALGORITHM
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Application layer security protocol
PPTX
Password based cryptography
PPT
Symmetric & Asymmetric Cryptography
PPT
Data encryption standard
PDF
AES-Advanced Encryption Standard
PPT
DES (Data Encryption Standard) pressentation
PPTX
Types of attacks
PPTX
Symmetric and asymmetric key
PPTX
Secure Socket Layer (SSL)
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Transport Layer Security (TLS)
PPTX
Key Management and Distribution
PDF
2. Stream Ciphers
Message authentication
 
2. public key cryptography and RSA
IP Security
Pretty good privacy
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
RSA ALGORITHM
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Application layer security protocol
Password based cryptography
Symmetric & Asymmetric Cryptography
Data encryption standard
AES-Advanced Encryption Standard
DES (Data Encryption Standard) pressentation
Types of attacks
Symmetric and asymmetric key
Secure Socket Layer (SSL)
Cryptography - Block cipher & stream cipher
Transport Layer Security (TLS)
Key Management and Distribution
2. Stream Ciphers
Ad

Similar to Transport layer security.ppt (20)

PPT
ch16-Cryptography and Network Security.ppt
PPT
Web security.ppt and Information Security introduction and management.pptx
PPT
Transportsec
PPT
Web securiy - Network security essentials
PPT
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
PDF
BAIT1103 Chapter 4
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PPTX
Secure Sockets Layer (SSL)
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
SSL And TLS
PDF
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
PPT
cryptography and network security thid.ppt
PPTX
Sequere socket Layer
PPTX
Internet security protocol
PDF
Transport Layer Security
PPT
tls security fda fkj k kjkfjsdkl jkjfsdk.ppt
PPT
SecureSocketLayer.ppt
PDF
wolfSSL and TLS 1.3
ch16-Cryptography and Network Security.ppt
Web security.ppt and Information Security introduction and management.pptx
Transportsec
Web securiy - Network security essentials
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
BAIT1103 Chapter 4
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
Secure Sockets Layer (SSL)
SECURE SOCKET LAYER ( WEB SECURITY )
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
SSL And TLS
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
cryptography and network security thid.ppt
Sequere socket Layer
Internet security protocol
Transport Layer Security
tls security fda fkj k kjkfjsdkl jkjfsdk.ppt
SecureSocketLayer.ppt
wolfSSL and TLS 1.3
Ad

More from ImXaib (20)

PPTX
cellular-communication-system presentation.pptx
PPTX
informationandnetworksecurity16transpositionciphers-210723152730.pptx
PPTX
ALI HAMZAH PRESENTATION ON INFO SECURITY.pptx
PPTX
Advance Machine Learning presentation.pptx
PPTX
NEW METHODOLOGIES FOR IDENTIFYING CUSTOMER NEEDS FROM USER-GENERATED CONTENTS...
PPTX
ERD introduction in databases model.pptx
PPTX
SDA presentation the basics of computer science .pptx
PPTX
terminal a clear presentation on the topic.pptx
PPTX
What is Machine Learning_updated documents.pptx
PPTX
Grid Computing and it's applications.PPTX
PDF
Firewall.pdf
PPT
4966709.ppt
PPT
lecture2.ppt
PPTX
Tools.pptx
PPT
lec3_10.ppt
PPT
ch12.ppt
PPT
Fullandparavirtualization.ppt
PPT
mis9_ch08_ppt.ppt
PPT
rooster-ipsecindepth.ppt
PPT
Policy formation and enforcement.ppt
cellular-communication-system presentation.pptx
informationandnetworksecurity16transpositionciphers-210723152730.pptx
ALI HAMZAH PRESENTATION ON INFO SECURITY.pptx
Advance Machine Learning presentation.pptx
NEW METHODOLOGIES FOR IDENTIFYING CUSTOMER NEEDS FROM USER-GENERATED CONTENTS...
ERD introduction in databases model.pptx
SDA presentation the basics of computer science .pptx
terminal a clear presentation on the topic.pptx
What is Machine Learning_updated documents.pptx
Grid Computing and it's applications.PPTX
Firewall.pdf
4966709.ppt
lecture2.ppt
Tools.pptx
lec3_10.ppt
ch12.ppt
Fullandparavirtualization.ppt
mis9_ch08_ppt.ppt
rooster-ipsecindepth.ppt
Policy formation and enforcement.ppt

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
master seminar digital applications in india
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
Business Ethics Teaching Materials for college
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
TR - Agricultural Crops Production NC III.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial disease of the cardiovascular and lymphatic systems
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Renaissance Architecture: A Journey from Faith to Humanism
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india
Pharmacology of Heart Failure /Pharmacotherapy of CHF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Supply Chain Operations Speaking Notes -ICLT Program
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Insiders guide to clinical Medicine.pdf
Business Ethics Teaching Materials for college
O7-L3 Supply Chain Operations - ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf

Transport layer security.ppt

  • 2. In this Presentation:  need for web security  SSL/TLS transport layer security protocols  HTTPS  secure shell (SSH)
  • 3. Web Security  Web now widely used by business, government, individuals  but Internet & Web are vulnerable  have a variety of threats  integrity  confidentiality  denial of service  authentication  need added security mechanisms
  • 4. Web Traffic Security Approaches
  • 5. SSL (Secure Socket Layer)  transport layer security service  originally developed by Netscape  version 3 designed with public input  subsequently became Internet standard known as TLS (Transport Layer Security)  uses TCP to provide a reliable end-to-end service  SSL has two layers of protocols
  • 7. SSL Architecture  SSL connection  a transient, peer-to-peer, communications link  associated with 1 SSL session  SSL session  an association between client & server  created by the Handshake Protocol  define a set of cryptographic parameters  may be shared by multiple SSL connections
  • 8. SSL Record Protocol Services  confidentiality  using symmetric encryption with a shared secret key defined by Handshake Protocol  AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4- 40, RC4-128  message is compressed before encryption  message integrity  using a MAC with shared secret key  similar to HMAC but with different padding
  • 10. SSL Change Cipher Spec Protocol  one of 3 SSL specific protocols which use the SSL Record protocol  a single message  causes pending state to become current  hence updating the cipher suite in use
  • 11. SSL Alert Protocol  conveys SSL-related alerts to peer entity  severity  warning or fatal  specific alert  fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter  warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown  compressed & encrypted like all SSL data
  • 12. SSL Handshake Protocol  allows server & client to:  authenticate each other  to negotiate encryption & MAC algorithms  to negotiate cryptographic keys to be used  comprises a series of messages in phases 1. Establish Security Capabilities 2. Server Authentication and Key Exchange 3. Client Authentication and Key Exchange 4. Finish
  • 14. Cryptographic Computations  master secret creation  a one-time 48-byte value  generated using secure key exchange (RSA / Diffie- Hellman) and then hashing info  generation of cryptographic parameters  client write MAC secret, a server write MAC secret, a client write key, a server write key, a client write IV, and a server write IV  generated by hashing master secret
  • 15. TLS (Transport Layer Security)  IETF standard RFC 2246 similar to SSLv3  with minor differences  in record format version number  uses HMAC for MAC  a pseudo-random function expands secrets  based on HMAC using SHA-1 or MD5  has additional alert codes  some changes in supported ciphers  changes in certificate types & negotiations  changes in crypto computations & padding
  • 16. HTTPS  HTTPS (HTTP over SSL)  combination of HTTP & SSL/TLS to secure communications between browser & server  documented in RFC2818  no fundamental change using either SSL or TLS  use https:// URL rather than http://  and port 443 rather than 80  encrypts  URL, document contents, form data, cookies, HTTP headers
  • 17. HTTPS Use  connection initiation  TLS handshake then HTTP request(s)  connection closure  have “Connection: close” in HTTP record  TLS level exchange close_notify alerts  can then close TCP connection  must handle TCP close before alert exchange sent or completed
  • 18. Secure Shell (SSH)  protocol for secure network communications  designed to be simple & inexpensive  SSH1 provided secure remote logon facility  replace TELNET & other insecure schemes  also has more general client/server capability  SSH2 fixes a number of security flaws  documented in RFCs 4250 through 4254  SSH clients & servers are widely available  method of choice for remote login/ X tunnels
  • 20. SSH Transport Layer Protocol  server authentication occurs at transport layer, based on server/host key pair(s)  server authentication requires clients to know host keys in advance  packet exchange  establish TCP connection  can then exchange data  identification string exchange, algorithm negotiation, key exchange, end of key exchange, service request  using specified packet format
  • 21. SSH User Authentication Protocol  authenticates client to server  three message types:  SSH_MSG_USERAUTH_REQUEST  SSH_MSG_USERAUTH_FAILURE  SSH_MSG_USERAUTH_SUCCESS  authentication methods used  public-key, password, host-based
  • 22. SSH Connection Protocol  runs on SSH Transport Layer Protocol  assumes secure authentication connection  used for multiple logical channels  SSH communications use separate channels  either side can open with unique id number  flow controlled  have three stages:  opening a channel, data transfer, closing a channel  four types:  session, x11, forwarded-tcpip, direct-tcpip.
  • 24. Port Forwarding  convert insecure TCP connection into a secure SSH connection  SSH Transport Layer Protocol establishes a TCP connection between SSH client & server  client traffic redirected to local SSH, travels via tunnel, then remote SSH delivers to server  supports two types of port forwarding  local forwarding – hijacks selected traffic  remote forwarding – client acts for server