SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Presentation on :




        Transport Layer Security
                 (TLS)


                    Presented by : Chhatra Thapa
Two protocols are dominant today for providing
security at the transport layer




 Secure Sockets Layer (SSL) protocol
 Transport Layer Security (TLS) protocol
Definition:




 Transport Layer Security (TLS) was designed to
  provide security at the transport layer.
 TLS was derived from a security protocol called
  Secure Sockets Layer (SSL).
Location of SSL and TSL in the Internet mode
TLS layers : Four TLS protocol
1. Handshake protocol
Hash for Certificate Verify message in TLS
Hash for Finished message in TLS
2. Change Cipher Spec Protocol
3. Alert protocol
4. Record protocol
Transport Layer Security

Weitere ähnliche Inhalte

Was ist angesagt?

Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
wonloser
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
limsh
 
Chapter 5 slides
Chapter 5 slidesChapter 5 slides
Chapter 5 slides
lara_ays
 

Was ist angesagt? (20)

Transport layer
Transport layerTransport layer
Transport layer
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
HTTPS
HTTPSHTTPS
HTTPS
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Basics of ssl
Basics of sslBasics of ssl
Basics of ssl
 
IPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP ExplainedIPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP Explained
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Chapter 5 slides
Chapter 5 slidesChapter 5 slides
Chapter 5 slides
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 

Andere mochten auch

Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
keithrozario
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 

Andere mochten auch (20)

Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
SSL, FFL, SFL Abbreviations
SSL, FFL, SFL AbbreviationsSSL, FFL, SFL Abbreviations
SSL, FFL, SFL Abbreviations
 
Kerberos
KerberosKerberos
Kerberos
 
SSL
SSLSSL
SSL
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 

Transport Layer Security

Hinweis der Redaktion

  1. The first difference is the version number (major and minor). The current version of SSL is 3.0; the current version of TLS is 1.0. In other words, SSLv3.0 is compatible with TLSv1.0.Another minor difference between SSL and TLS is the lack of support for the Fortezza method. TLS does not support Fortezza for key exchange or for encryption/decryption. “standardized” by IETF RFC2246.
  2. End-to-end between a client and server – Sits on top of TCP – Requires reliable connectionMost important Internet crypto protocol? – Secure web pages – E-mail and LDAP access control
  3. Handshake: Responsible for negotiating security, authenticating the server to the browser, and (optionally) defining other communication parameters.Data exchange (record) protocol uses the secret key to encrypt the data for secrecy and to encrypt the message digest for integrity.Phase 1 : Client sideversion, client random number, session id , compression method Server sideVersion, server random number, session, selected compression methodAfter Phase I, the client and server know the following:The version of SSL❏ The algorithms for key exchange, message authentication, and encryption❏ The compression method❏ The two random numbers for key generationPhase 2: After Phase II,❏ The server is authenticated to the client.❏ The client knows the public key of the server if required.Server sends a certificate message that includes the public key of the server. The public key is certified by some certification authority, which means that the public key is encrypted by a CA private key. Browser has a list of CAs and their public keys. It uses the corresponding key to decrypt the certification and finds the server public key. This also authenticates the server because the public key is certified by the CA.Phase 3: After Phase III,❏ The client is authenticated for the server.❏ Both the client and the server know the pre-master secret.Browser sends a secret key, encrypts it with the server public key, and sends it to the server.Phase 4:After Phase IV, the client and server are ready to exchange data.Browser sends a message, encrypted by the secret key, to inform the server that handshaking is terminating from the browser key.Server decrypts the secret key using it private key and decrypts the message using the secret key. It then sends a message, encrypted by the secret key, to inform the browser that handshaking is terminating from the server side.
  4. TLS supports all of the alerts defined in SSL except for NoCertificate. TLS also adds some new ones to the list. Table shows the full list of alerts supported by TLS.