SECURE NOTEPAD BY ANKUR DESHMUKH & P JAYA SUNDERAM.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 16
Advertisements

Cryptography and Network Security
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
SSL (Secure Socket Layer)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Internet and Intranet Protocols and Applications Lecture 9b: How Java Supports SSL March, 2004 Arthur Goldberg Computer Science Department New York University.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Team - CA CSCI 5234 Web Security.  Collect and document information of ecommerce security mechanisms.  Using: wiki engine for collaboration.
JSSE API University of Palestine Eng. Wisam Zaqoot April 2010.
Softsmith Infotech Secure Socket Layer (SSL) and Tomcat.
11 Secure Sockets Layer (SSL) Protocol (SSL) Protocol Saturday, University of Palestine Applied and Urban Engineering College Information Security.
Internet-Based Client Access
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Secure Sockets Layer (SSL) Presented by: Piyush Saggi Baylor University Dec 6, 2002.
Network Security Essentials Chapter 5
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (SSL)
ECommerce for software ICE525 Chung Sukwon, Lee Ilnam.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
SARVAJANIK COLLEGE OF ENGINEERING & TECHNOLOGY. Secure Sockets Layer (SSL) Protocol Presented By Shivangi Modi Presented By Shivangi ModiCo-M(Shift-1)En.No
Secure Sockets Layer (SSL) Protocol by Steven Giovenco.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 MobiHealth Security Requirements and Proposal MobiHealth Security Requirements and Proposal Madrid 2002/11/12-13.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Cryptography CSS 329 Lecture 13:SSL.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
The Secure Sockets Layer (SSL) Protocol
Web Security CS-431.
Visit for more Learning Resources
Cryptography and Network Security Chapter 16
NETWORK PROGRAMMING CNET 441
CSE 4095 Transport Layer Security TLS
Cryptography and Network Security
MIDP Application Security
The Secure Sockets Layer (SSL) Protocol
Network Security 4/21/2019 Raj Rajarajan.
Information Retrieval and Web Design
Cryptography and Network Security
Presentation transcript:

SECURE NOTEPAD BY ANKUR DESHMUKH & P JAYA SUNDERAM

OVERVIEW  Why this project ?  Overview of SSL  Architecture  Overview of JSSE  Our application

WHY THIS PROJECT ?  Convenience for users.  Learn about SSL (Secure Socket Layer)  Explore JSSE (Java Secure Socket Extension)  A big help to us.  Effort to make a contribution to open source

SSL – SECURE SOCKET LAYER  Introduced by Netscape in 1994  Most widely used protocol for implementing cryptography on the web.  Used over TCP.  Why use SSL Authenticate user Protect data from attackers  SSL architecture

SSL (…continued)

JSSE OVERVIEW  Implemented in 100% Pure Java  Provides API support for SSL versions 2.0 and 3.0, and an implementation of SSL version 3.0  Includes classes that can be instantiated to create secure channels (SSLSocket, SSLServerSocket, and SSLEngine)  Support for various ciphers like RSA, DES, AES,DSA and others.

…Continued  Provides support for client and server authentication, which is part of the normal SSL handshaking  Provides support for HTTP encapsulated in the SSL protocol (HTTPS), which allows access to data such as web pages using HTTPS  It ships with JSDK 1.4.2

ARCHITECTURE

CODE SNIPPET  Client  // Create a non-blocking socket channel  SocketChannel socketChannel = SocketChannel.open();  socketChannel.configureBlocking(false);  socketChannel.connect(new InetSocketAddress(hostname, port));  // Do initial handshake  doHandshake(socketChannel, engine, myNetData, peerNetData);  myAppData.put("hello".getBytes());  Server  int num = socketChannel.read(peerNetData);  if (num == -1) { // Handle closed channel } else if (num == 0) { // No bytes read; try again... } else { // Process incoming data peerNetData.flip();  res = engine.unwrap(peerNetData, peerAppData);  if (res.getStatus() == SSLEngineResult.Status.OK) { peerNetData.compact(); if (peerAppData.hasRemaining()) { // Use peerAppData } }

SECURE NOTEPAD  Written in java  Incorporated security using SSL  Emulates basic features of a notepad. Edit Formatting

CONTINUED..

BIBLIOGRAPHY    Cryptography and Network Security: PRINCIPLIES AND PRACTICES, William Stallings