SlideShare a Scribd company logo
1
Secure Socket Layer
•Dr Paras Kothari
2
SSL Facts
• SSL was first developed by Netscape in 1994
and became an internet standard in 1996 (
RFC 2246 – TLS V1.0)
• SSL is a cryptographic protocol to secure
network across a connection-oriented layer
• Any program using TCP can be modified to
use SSL connection
3
SSL Facts
• SSL connection uses a dedicated TCP/IP
socket(e.g. port 443 for https)
• SSL is flexible in choice of which symmetric
encryption, message digest, and authentication can
be used
• SSL provides built in data compression
4
SSL Usage
• Authenticate the server to the client
• Allow the client and server to select cryptographic
algorithms, or ciphers, that they both support
• Optionally authenticate the client to the server
• Use public key encryption techniques to generate
shared secret
• Establish an encrypted SSL connection
5
Secure Socket Layer
SSL is a secure protocol which runs above TCP/IP
and allows users to encrypt data and authenticate
servers/vendors identity securely
Application
layer
Transport
layerTCP/IP Layer
SMTPSFTPSHTTPS
SECURE SOCKET LAYER
6
SSL Stack
7
SSL Record Protocol Operation
8
SSL Record Format
9
SSL Handshake
SSL handshake verifies the server and allows
client and server to agree on an encryption set
before any data is sent out
10
SSL Handshake
11
SSL Handshake
Server
Client
Public
key
Private
key
Client
request
Public key
12
SSL Session Key
Server
Client
Public
key
Private
key
Public key Pre-Master
Pre-
Master
Pre-
Master
Session key
Session key
13
Secure Data on Network
Server
Client
Public
key
Private
key
Session
key
Data Session key Data
Data
Data Session key Data
14
Man-in-the-Middle Attack
Server
Client
Public
key
Private
key
Hacker
Public
key
Private
key
Pre-
master
Public
key
Public
key
Public key
Session
key
Pre-master
Public
key
Pre-
master
Pre-
master
Session
key
15
Key exchange and certificate
SSL version number client supported
(v2, v3)
Ciphers supported client
(DES, RC2, RC4)
Client Random Number
SSL version number server picked
(v2, v3)
Ciphers server picked
(DES, RC2, RC4)
Server Random Number
Server
Client
Public
key
Private
key
Public key
Certificate
16
Verify Certificate
Checking
Server
Client
Public
key
Private
key
Client
request
Certificate
Certificate
Valid
Public key
Certificate is Good and Valid
Server/vendor has been verified and authenticated
Client has vendor’s public key and
can now encrypt pre-master to send
to server/vendor
17
Not-recognizable Certificate
18
SSL Handshake
Client hello
Server hello
Present Server Certificate
*Request Client Certificate
Server Key Exchange
Client Finish
*Present Client Certificate
Client Key Exchange
*Certificate Verify
Change Cipher Spec
Server Finish
Change Cipher Spec
Client
Server
Application Data
19
Server Hello Request
• Notifies the client that they should send a client hello
message to begin the negotiation process
• Sent by the server at any time
• After the server sends a request, it does not send
another one until a handshake has been completed
• Client can choose to ignore them or send a Client
Hello
20
Client Hello
• Sent by the client
–When first connecting to a server
–In response to a hello request or on its own
• Contains
–32 bytes random number created by a
secure random number generator
–Protocol version
–Session ID
–A list of supported ciphers
–A list of compression methods
21
Server Hello
• Sent as response if client hello is accepted
– If not, a handshake failure alert is sent
• Contains
– 32 bytes random number created by a secure random
number generator
– Protocol version
– Session ID
– Cipher suite chosen
– Compression method selected
22
Server Certificates
• Immediately following the server hello, the
server sends its certificate
– Generally an X.509.v3 certificate
• Server sends server hello done message
23
Key Exchange
• Client sends 48-bytes pre-master, encrypted
using server’s public key, to the server
• Both server and client use the pre-master to
generate the master secret
• A same session key is generated on both
client and server side using the master secret
24
SSL Architecture
25
Record Layer
• Compression and decompression
• A MAC is applied to each record using the MAC
algorithm defined in the current cipher spec
• Encryption occurs after compression
• May need fragmentation
26
SSL Architecture
27
Alert Layer
• Explain severity of the message and a description
–fatal
•Immediate termination
•Other connections in session may continue
•Session ID invalidated to prevent failed session to open new
sessions
• Alerts are compressed same as other data
28
SSL Architecture
29
Change Cipher Spec Protocol
• Notify the other party to use the new
cipher suite
• Before the Finished message
30
Comparison of SSL V2.0 and V3.0
• SSL 2.0 is vulnerable to “man-in-the-
middle” attack. The hello message can
be modified to use 40 bits encryption.
SSL 3.0 defends against this attack by
having the last handshake message
include a hash of all the previous
handshake message
31
Comparison of SSL V2.0 and V3.0
• SSL 2.0 uses a weak MAC construction
• In SSL 3.0, the Message Authentication
Hash uses a full 128 bits of key material
for Export cipher, while SSL 2.0 uses
only 40 bits
32
Comparison of SSL V2.0 and V3.0
• SSL 2.0 only allows a handshake at the beginning of
the connection. In 3.0, the client can initiate a
handshake routine any time
• SSL 3.0 allows server and client to send chains of
certificate
• SSL 3.0 has a generalized key exchange protocol. It
allows Diffie-Hellman and Fortezza key exchange
• SSL 3.0 allows for record compression and
decompression
Query Session
Still if you have …
33

More Related Content

What's hot (20)

PPTX
Ssl in a nutshell
Frank Kelly
 
PPTX
SSL And TLS
Ghanshyam Patel
 
PPTX
HTTP vs HTTPS, Do You Really Need HTTPS?
CheapSSLsecurity
 
PPTX
TLS v1.3
Siddhartha Rao
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
PPTX
cryptography
Abhijeet Singh
 
PPTX
IP Sec - Basic Concepts
Avadhesh Agrawal
 
PPTX
Hash Function
ssuserdfb2da
 
PDF
An introduction to X.509 certificates
Stephane Potier
 
PPT
Ssl https
Andrada Boldis
 
PPT
6. cryptography
7wounders
 
PPTX
One Time Pad Encryption Technique
John Adams
 
PPTX
Secret key cryptography
Prabhat Goel
 
PPTX
Hash function
Salman Memon
 
PPTX
Transport Layer Security (TLS)
Arun Shukla
 
PPT
Cryptography Fundamentals
Duy Do Phan
 
PDF
2. Stream Ciphers
Sam Bowne
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PPTX
TLS - Transport Layer Security
ByronKimani
 
PPT
Ip sec and ssl
Mohd Arif
 
Ssl in a nutshell
Frank Kelly
 
SSL And TLS
Ghanshyam Patel
 
HTTP vs HTTPS, Do You Really Need HTTPS?
CheapSSLsecurity
 
TLS v1.3
Siddhartha Rao
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
cryptography
Abhijeet Singh
 
IP Sec - Basic Concepts
Avadhesh Agrawal
 
Hash Function
ssuserdfb2da
 
An introduction to X.509 certificates
Stephane Potier
 
Ssl https
Andrada Boldis
 
6. cryptography
7wounders
 
One Time Pad Encryption Technique
John Adams
 
Secret key cryptography
Prabhat Goel
 
Hash function
Salman Memon
 
Transport Layer Security (TLS)
Arun Shukla
 
Cryptography Fundamentals
Duy Do Phan
 
2. Stream Ciphers
Sam Bowne
 
Data Encryption Standard (DES)
Haris Ahmed
 
TLS - Transport Layer Security
ByronKimani
 
Ip sec and ssl
Mohd Arif
 

Similar to Secure socket layer (20)

PPT
SecureSocketLayer.ppt
PranavUndre1
 
PPT
SSL Secure Socket Layer
omkar bhagat
 
PPT
Secure socket later
Muhammad Ahmad Nazar
 
PPT
cryptography and network security thid.ppt
ubaidullah75790
 
PPTX
Cryptography by Afroz haider mir
AFROZ MIR
 
PDF
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
PDF
BAIT1103 Chapter 4
limsh
 
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
PPTX
Transport Layer Security
Huda Seyam
 
PPT
tls security fda fkj k kjkfjsdkl jkjfsdk.ppt
sandhyadevit
 
PDF
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
KanchanPatil34
 
PPT
Transportsec
Bogdan Korniyenko
 
PDF
CNIT 141: 13. TLS
Sam Bowne
 
PDF
CNIT 141 13. TLS
Sam Bowne
 
PPTX
Internet security protocol
Mousmi Pawar
 
PDF
CNIT 141: 13. TLS
Sam Bowne
 
PDF
Network Security Applications
Hatem Mahmoud
 
PPT
Lecture 6 web security
rajakhurram
 
PPT
8.SSL encryption.ppt
NoName261177
 
SecureSocketLayer.ppt
PranavUndre1
 
SSL Secure Socket Layer
omkar bhagat
 
Secure socket later
Muhammad Ahmad Nazar
 
cryptography and network security thid.ppt
ubaidullah75790
 
Cryptography by Afroz haider mir
AFROZ MIR
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
BAIT1103 Chapter 4
limsh
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
Transport Layer Security
Huda Seyam
 
tls security fda fkj k kjkfjsdkl jkjfsdk.ppt
sandhyadevit
 
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
KanchanPatil34
 
Transportsec
Bogdan Korniyenko
 
CNIT 141: 13. TLS
Sam Bowne
 
CNIT 141 13. TLS
Sam Bowne
 
Internet security protocol
Mousmi Pawar
 
CNIT 141: 13. TLS
Sam Bowne
 
Network Security Applications
Hatem Mahmoud
 
Lecture 6 web security
rajakhurram
 
8.SSL encryption.ppt
NoName261177
 
Ad

More from Nishant Pahad (20)

PPTX
International business 1
Nishant Pahad
 
PPTX
International business 4 WORLD TRADE
Nishant Pahad
 
PPTX
International business 2 ECONOMIC SYSTEM
Nishant Pahad
 
DOC
10 online transactions
Nishant Pahad
 
PPT
Micro finance in India: legal and regulatory framework
Nishant Pahad
 
PPTX
Credit facilities and support services
Nishant Pahad
 
PPSX
e-business technologies and trends
Nishant Pahad
 
PPSX
E ticketing
Nishant Pahad
 
PPSX
E marketing planning
Nishant Pahad
 
PPSX
E marketing planning
Nishant Pahad
 
PPSX
E - governance
Nishant Pahad
 
PPSX
E governance
Nishant Pahad
 
PPSX
E banking
Nishant Pahad
 
PPTX
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Nishant Pahad
 
PPTX
Online commodity trading
Nishant Pahad
 
PPTX
commodity trading and derivatives
Nishant Pahad
 
PPT
Commodity derivatives
Nishant Pahad
 
PPTX
Issues and challenges in e-business
Nishant Pahad
 
PPTX
EDI
Nishant Pahad
 
PPTX
E business models
Nishant Pahad
 
International business 1
Nishant Pahad
 
International business 4 WORLD TRADE
Nishant Pahad
 
International business 2 ECONOMIC SYSTEM
Nishant Pahad
 
10 online transactions
Nishant Pahad
 
Micro finance in India: legal and regulatory framework
Nishant Pahad
 
Credit facilities and support services
Nishant Pahad
 
e-business technologies and trends
Nishant Pahad
 
E ticketing
Nishant Pahad
 
E marketing planning
Nishant Pahad
 
E marketing planning
Nishant Pahad
 
E - governance
Nishant Pahad
 
E governance
Nishant Pahad
 
E banking
Nishant Pahad
 
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Nishant Pahad
 
Online commodity trading
Nishant Pahad
 
commodity trading and derivatives
Nishant Pahad
 
Commodity derivatives
Nishant Pahad
 
Issues and challenges in e-business
Nishant Pahad
 
E business models
Nishant Pahad
 
Ad

Recently uploaded (20)

PPTX
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
PPTX
Urban Hierarchy and Service Provisions.pptx
Islamic University of Bangladesh
 
PPTX
How to use grouped() method in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Martyrs of Ireland - who kept the faith of St. Patrick.pptx
Martin M Flynn
 
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
PPTX
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
 
PDF
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
PDF
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
PDF
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
 
PPTX
ESP 10 Edukasyon sa Pagpapakatao PowerPoint Lessons Quarter 1.pptx
Sir J.
 
PPTX
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
PPTX
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
PDF
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
 
PPTX
ENGLISH -PPT- Week1 Quarter1 -day-1.pptx
garcialhavz
 
PPTX
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
PPTX
Photo chemistry Power Point Presentation
mprpgcwa2024
 
PDF
Rapid Mathematics Assessment Score sheet for all Grade levels
DessaCletSantos
 
DOCX
MUSIC AND ARTS 5 DLL MATATAG LESSON EXEMPLAR QUARTER 1_Q1_W1.docx
DianaValiente5
 
PPTX
Iván Bornacelly - Presentation of the report - Empowering the workforce in th...
EduSkills OECD
 
PPTX
Peer Teaching Observations During School Internship
AjayaMohanty7
 
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
Urban Hierarchy and Service Provisions.pptx
Islamic University of Bangladesh
 
How to use grouped() method in Odoo 18 - Odoo Slides
Celine George
 
Martyrs of Ireland - who kept the faith of St. Patrick.pptx
Martin M Flynn
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
 
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
 
ESP 10 Edukasyon sa Pagpapakatao PowerPoint Lessons Quarter 1.pptx
Sir J.
 
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
 
ENGLISH -PPT- Week1 Quarter1 -day-1.pptx
garcialhavz
 
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
Photo chemistry Power Point Presentation
mprpgcwa2024
 
Rapid Mathematics Assessment Score sheet for all Grade levels
DessaCletSantos
 
MUSIC AND ARTS 5 DLL MATATAG LESSON EXEMPLAR QUARTER 1_Q1_W1.docx
DianaValiente5
 
Iván Bornacelly - Presentation of the report - Empowering the workforce in th...
EduSkills OECD
 
Peer Teaching Observations During School Internship
AjayaMohanty7
 

Secure socket layer