1
Date: 2079/01/9
Submitted By:
Arun Prajapati
Babin Datheputhe
Jenish Prajapati
Manish Hyongoju
Shreejan Shilpakar
Introduction
● It is an Internet Protocol for secure exchange of information between a web browser and a web
server
● Ensuring that all data passed between them remain private and free from attack.
● This is done with the use of Certificates and keys
● Security services are:
○ Authentication
○ Confidentiality
○ Message integrity
● Developed By Netscape Corporation in 1994.
● Currently comes in three versions: 2,3 and 3.1
2
Example of SSL with Amazon
3
- Secured Website like Amazon uses SSL.
- padlock icon. Or (in status bar) or https
- This indicates website’s server uses SSL to secure your personal information.
- This type of SSL between a client and a website server is known as Server
Authentication.
Fig. Example of Secure connection
Server Authentication
4
Fig. Example of Certificate
Steps for SSL Communication
1) Client connects to a web server (website) secured with SSL (https). Client requests that the
server identify itself.
2) Server sends a copy of its SSL Certificate, including the server’s public key.
3) Client checks that the certificate is trusted: unexpired, unrevoked, and valid for the website that
it is connecting to. If the client trusts the certificate, it creates, encrypts, and sends back a session
key using the server’s public key.
4) Server decrypts the symmetric session key using its private key and begins an encrypted
session with the client. The server and client now encrypt all transmitted data with the session key.
5
Fig. General view of SSL
communication
SSL Communication diagram/
Handshake diagram
6
Fig. SSL handshake diagram
Position of SSL in TCP/IP
7
Fig. TCP/IP or OSI layer
SSL ARCHITECTURE
8
Fig. Architecture of SSL with respect to OSI
layer
SSL Protocol Stack
● Handshake phase
Handshake Protocol is used to establish sessions. This protocol allows the
client and server to authenticate each other by sending a series of messages to
each other. Handshake protocol uses four phases to complete its cycle.
● Change-cipher Protocol
This protocol uses the SSL record protocol. Unless Handshake Protocol is
completed, the SSL record Output will be in a pending state. After handshake
protocol, the Pending state is converted into the current state. Change-cipher
protocol consists of a single message which is 1 byte in length and can have
only one value. This protocol’s purpose is to cause the pending state to be
copied into the current state.
9
● Alert Protocol
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
This Alert has no impact on the connection between sender and receiver.
But, alert level indicates :
Level -1 : Bad certificate, no certificate or certificate expired etc.
Level-2 : Handshake failure, Decompression failure, Bad record MAC etc.
10
SSL Record Protocol
11
● Divided into fragments
● Block compressed
● Compression encrypted with
MAC(Message
Authentication Code)
● Encryption of data is done
● SSL header is added
Silent Features
• The advantage of this approach is that the service can be tailored to the
specific needs of the given application.
• Secure Socket Layer was originated by Netscape.
• SSL is designed to make use of TCP to provide reliable end-to-end secure
service.
• This is a two-layered protocol.
12
SSL Services
●Receive data from any application layer protocol but receives typically from
HTTP
●Data received from application are optionally compressed, signed and
encrypted.
●The data is then passed to TCP layer
●SSL provides services on data received from application layer such as:-
13
SSL Services
1.Fragmentation
At first SSL provides the data block into blocks of sizes 2^14 bytes or less
2.Compression
Each fragment of data is compressed using lossless compression negotiated between
the transmitter and receiver. This service is optional
3. Message Integrity
to preserve the integrity of data, SSL uses keyed between hash function to create a MAC
4. Confidentiality
the original data and MAC are encrypted using symmetric key cryptography
5. Framing
A header is added to encrypted payload which is then passed to a reliable transport
layer protocol such as TCP
14
Thank you!!!
15

More Related Content

PPTX
Secure Sockets Layer (SSL)
PPT
Secure socket later
PPTX
The last picks
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PPSX
Secure socket layer
PPSX
Secure socket layer
PDF
SSL Secure socket layer
PPTX
group no 6.pptx
Secure Sockets Layer (SSL)
Secure socket later
The last picks
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
Secure socket layer
Secure socket layer
SSL Secure socket layer
group no 6.pptx

Similar to Secure Socket Layer.pptx (20)

PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
SSL And TLS
PPTX
ncsmodule module department of electronics
PPTX
Network Security- Secure Socket Layer
PPTX
Sequere socket Layer
PPT
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
PPTX
Internet security protocol
PPT
SecureSocketLayer.ppt
PPT
Ssl (Secure Sockets Layer)
DOCX
What is TLS/SSL?
PDF
presentation2-151203145018-lva1-app6891.pdf
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PPT
Lecture 6 web security
PDF
BAIT1103 Chapter 4
PDF
VULNERABILITIES OF THE SSL/TLS PROTOCOL
PDF
Vulnerabilities of the SSL/TLS Protocol
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
SSL And TLS
ncsmodule module department of electronics
Network Security- Secure Socket Layer
Sequere socket Layer
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
Internet security protocol
SecureSocketLayer.ppt
Ssl (Secure Sockets Layer)
What is TLS/SSL?
presentation2-151203145018-lva1-app6891.pdf
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Lecture 6 web security
BAIT1103 Chapter 4
VULNERABILITIES OF THE SSL/TLS PROTOCOL
Vulnerabilities of the SSL/TLS Protocol
Ad

Recently uploaded (20)

PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Present and Future of Systems Engineering: Air Combat Systems
PDF
Java Basics-Introduction and program control
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Software Engineering and software moduleing
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PDF
Design of Material Handling Equipment Lecture Note
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
ai_satellite_crop_management_20250815030350.pptx
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Present and Future of Systems Engineering: Air Combat Systems
Java Basics-Introduction and program control
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Software Engineering and software moduleing
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Design of Material Handling Equipment Lecture Note
August 2025 - Top 10 Read Articles in Network Security & Its Applications
MAD Unit - 3 User Interface and Data Management (Diploma IT)
Management Information system : MIS-e-Business Systems.pptx
Amdahl’s law is explained in the above power point presentations
Cryptography and Network Security-Module-I.pdf
ai_satellite_crop_management_20250815030350.pptx
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
PRASUNET_20240614003_231416_0000[1].pptx
August -2025_Top10 Read_Articles_ijait.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Ad

Secure Socket Layer.pptx

  • 1. 1 Date: 2079/01/9 Submitted By: Arun Prajapati Babin Datheputhe Jenish Prajapati Manish Hyongoju Shreejan Shilpakar
  • 2. Introduction ● It is an Internet Protocol for secure exchange of information between a web browser and a web server ● Ensuring that all data passed between them remain private and free from attack. ● This is done with the use of Certificates and keys ● Security services are: ○ Authentication ○ Confidentiality ○ Message integrity ● Developed By Netscape Corporation in 1994. ● Currently comes in three versions: 2,3 and 3.1 2
  • 3. Example of SSL with Amazon 3 - Secured Website like Amazon uses SSL. - padlock icon. Or (in status bar) or https - This indicates website’s server uses SSL to secure your personal information. - This type of SSL between a client and a website server is known as Server Authentication. Fig. Example of Secure connection
  • 5. Steps for SSL Communication 1) Client connects to a web server (website) secured with SSL (https). Client requests that the server identify itself. 2) Server sends a copy of its SSL Certificate, including the server’s public key. 3) Client checks that the certificate is trusted: unexpired, unrevoked, and valid for the website that it is connecting to. If the client trusts the certificate, it creates, encrypts, and sends back a session key using the server’s public key. 4) Server decrypts the symmetric session key using its private key and begins an encrypted session with the client. The server and client now encrypt all transmitted data with the session key. 5 Fig. General view of SSL communication
  • 6. SSL Communication diagram/ Handshake diagram 6 Fig. SSL handshake diagram
  • 7. Position of SSL in TCP/IP 7 Fig. TCP/IP or OSI layer
  • 8. SSL ARCHITECTURE 8 Fig. Architecture of SSL with respect to OSI layer
  • 9. SSL Protocol Stack ● Handshake phase Handshake Protocol is used to establish sessions. This protocol allows the client and server to authenticate each other by sending a series of messages to each other. Handshake protocol uses four phases to complete its cycle. ● Change-cipher Protocol This protocol uses the SSL record protocol. Unless Handshake Protocol is completed, the SSL record Output will be in a pending state. After handshake protocol, the Pending state is converted into the current state. Change-cipher protocol consists of a single message which is 1 byte in length and can have only one value. This protocol’s purpose is to cause the pending state to be copied into the current state. 9
  • 10. ● Alert Protocol This protocol is used to convey SSL-related alerts to the peer entity. Each message in this protocol contains 2 bytes. This Alert has no impact on the connection between sender and receiver. But, alert level indicates : Level -1 : Bad certificate, no certificate or certificate expired etc. Level-2 : Handshake failure, Decompression failure, Bad record MAC etc. 10
  • 11. SSL Record Protocol 11 ● Divided into fragments ● Block compressed ● Compression encrypted with MAC(Message Authentication Code) ● Encryption of data is done ● SSL header is added
  • 12. Silent Features • The advantage of this approach is that the service can be tailored to the specific needs of the given application. • Secure Socket Layer was originated by Netscape. • SSL is designed to make use of TCP to provide reliable end-to-end secure service. • This is a two-layered protocol. 12
  • 13. SSL Services ●Receive data from any application layer protocol but receives typically from HTTP ●Data received from application are optionally compressed, signed and encrypted. ●The data is then passed to TCP layer ●SSL provides services on data received from application layer such as:- 13
  • 14. SSL Services 1.Fragmentation At first SSL provides the data block into blocks of sizes 2^14 bytes or less 2.Compression Each fragment of data is compressed using lossless compression negotiated between the transmitter and receiver. This service is optional 3. Message Integrity to preserve the integrity of data, SSL uses keyed between hash function to create a MAC 4. Confidentiality the original data and MAC are encrypted using symmetric key cryptography 5. Framing A header is added to encrypted payload which is then passed to a reliable transport layer protocol such as TCP 14