SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)

Slides:



Advertisements
Similar presentations
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
Advertisements

Lecture 6: Web security: SSL
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Internet Security Protocols
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Cryptography and Network Security Chapter 17
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Chapter 8 Web Security.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
SSL (TLS) Part 2 Generating the Premaster and Master Secrets + Encryption.
1 Understanding Secure Socket Layer (SSL) Advisor Advisor Prof. Tzonelih Hwang Presenter Prosanta Gope.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
The Secure Sockets Layer (SSL) Protocol
Cryptography and Network Security
Secure Sockets Layer (SSL)
CSCE 715: Network Systems Security
Visit for more Learning Resources
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Cryptography and Network Security
SSL (Secure Socket Layer)
The Secure Sockets Layer (SSL) Protocol
Transport Layer Security (TLS)
Cryptography and Network Security
Presentation transcript:

SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)

 Introduction to SSL  SSL Architecture  SSL Limitations

 Netscape  Secure connection between clients and servers essential for Internet’s success  Solution: Encryption and Decryption at a connection’s endpoints  Latest Version is 3.0  SSL sits directly on top of TCP: provides TCP-like interface to upper-layer applications  Supports any application Layer Protocol

 Two layer Protocol  SSL Record Protocol- encapsulation of higher layer protocols  SSL Handshake Protocol- allows server and client to authenticate,negotiate encryption algorithm and cryptographic keys

 Provide two services for SSL connections:  Confidentiality: by encrypting application data.  Message Integrity: by computing MAC over the compressed data.  Can be utilized by some upper-layer protocols of SSL.(hand shake protocol )

 SSL- specific protocols  Change Cipher Protocol  Alert Protocol  Handshake Protocol  Application data layer

 Signals transitions in ciphering strategies  It updates the CipherSuite that will be used on the current connection

 Alert messages communicate the severity of the message and a description of the alert  Fatal messages result in connection termination.

 Establishment of the secure channel between the client and the server  Provides the keys and the algorithm information to SSL Record Protocol, above it  Enables clients and servers  Negotiate cryptographic algorithms  Optionally authenticate each other  Generate shared secrets using public-key encryption techniques

 Handshake Protocol divided into 4 phases: 1. Establish Security Capabilities 2. Server Authentication and key Exchange 3. Client Authentication and key Exchange 4. Change CipherSpec and Finish

It provides encrypted connections between two machines It verifies that information transmitted during the session is not being monitored or diverted to a malicious third party. Unfortunately, SSL is not the answer to every security concern.

 The server you want to contact is the one you got.  No attacker can read or modify the data being transmitted between you and the Web server.

 Host Insecurities  Authentication issues  Backend clear-text storage and transmissions  SSL Implementation Flaws

Having an SSL- enabled Web server, often just called a 'secure Web server,' does not secure the machine itself. Examples: If a machine running an SSL enabled Web server also runs an IMAP (Internet Mail Access Protocol) server, then that machine becomes vulnerable. IMAP servers are known to be prone to attacks.

 The SSL certificate is based on the host name, nothing else.  Example: instead of

 Many Web servers get and store data using outside sources, such as databases or flat files  These files may be sent somewhere else without using a secure channel.  Example: credit card information

 Different vendors have their own implementation of SSL,which can have different flaws.  OpenSSL has been discovered to have multiple buffer overflow capabilities  Microsoft Internet Explorer does not properly check the digital "certificates" which guarantee the security of an SSL connection.

 Netscape 4.x and Mozilla are NOT vulnerable.  IE 5 and 5.5 are vulnerable straight-up, and IE 6 is mostly vulnerable