SlideShare ist ein Scribd-Unternehmen logo
1 von 16
1
 Stands for Secure Internet Live Conferencing.


 Designed as a secure replacement for IRC (Internet
 Relay Chat).

 Stable implementations for clients and server Also
 has some features of instant messangers are
 available.
                                                       2
 Designed by Pekka Riikonen, started '96.
 Work stopped several times.
 1st public release in 2000.
 Silc-client 1.0 oct. 2003.
 Currently maturing of protocol.
 Protocol specs submitted to IETF, currently in a
  draft phase (will become RFC soon).(Internet
  eng.task force)
 Version 1 of silc, toolkit to follow soon.         3
 Protocol for authenticated and encrypted


 Live Conferencing


 Supports chat and instant messenger like systems.


                                                      4
 Instant Messaging [IM]


 Internet Relay Chat [IRC]


 Extensible Messaging And Presence Protocol
 [EMPP]

 Secure Internet Live Conferencing [SILC]
                                               5
 Instant messaging (IM) is a collection of technologies
 used for real-time text-based communication between
 two or more participants over the Internet, or other
 types of networks

 Weakness :-
         Security risks
         Compliance risks

         Inappropriate use
                                                           6
 Internet Relay Chat (IRC) is a form of real-time
  Internet text messaging (chat) or synchronous
  conferencing.
 It is mainly designed for group communication.


 Weakness :-
      IRC connections are usually unencrypted and
 typically span long time periods, they are an
 attractive target for hackers.                      7
 EMPP is an open-standard communications protocol for
  message-oriented middleware based on
  XML.(extensible markup language).
 Systems approach of development and application.
 Google Wave's federation protocol is an extension to the
  EMPP protocol.
 Weaknesses:-
    Presence data overhead
    In-band binary data transfer is inefficient
                                                         8
Key-Features:
 All messages are encrypted and authenticated.
 Keys managed by server or user.
 Messages are sent through server-net.
 File transfer via SFTP.


                                                  9
 SERVERS


 ROUTERS


 CLIENT




            10
11
 SILC PACKET PROTOCOL


 SILC KEY EXCHANGE [SKE] PROTOCOL


 SILC CONNECTION AUTHENTICATION
 PROTOCOL

                                     12
13
 The file transfer support in chat protocols are a absolute
  requirement nowadays, and chat protocol without one is no chat
  protocol at all.

 The support for file transfer in SILC has been designed so that
  using practically any file transfer protocol is possible.

 The file transfer protocol used in SILC protocol is the
  SSH File Transfer protocol (SFTP).
                                                              14
 The Secure Internet Live Conferencing (SILC)
 protocol is a new generation chat protocol that
 provides all the common conferencing services with
 strong support for security. It has wide range of
 security properties that should meet the highest
 levels of security requirements, while not forgetting
 easy of use. The network topology offers new
 architectural solution with better scalability over
 traditional chat protocols.
                                                         15
16

Weitere ähnliche Inhalte

Was ist angesagt?

#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Siddharth Rao
 
Attack presentation
Attack presentationAttack presentation
Attack presentationFrikha Nour
 
Communication Privacy for Free Societies at Harvard
Communication Privacy for Free Societies at HarvardCommunication Privacy for Free Societies at Harvard
Communication Privacy for Free Societies at HarvardDavid Sugar
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsRainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsTEO LT, AB
 
Network Security Through FIREWALL
Network Security Through FIREWALLNetwork Security Through FIREWALL
Network Security Through FIREWALLTheCreativedev Blog
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlowLancope, Inc.
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Warren Bent
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P...
 Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P... Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P...
Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P...Minsk Linux User Group
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyMostafa El Lathy
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 

Was ist angesagt? (20)

#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Vpn presnt
Vpn presntVpn presnt
Vpn presnt
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
Introduction to VoIP Security
Introduction to VoIP SecurityIntroduction to VoIP Security
Introduction to VoIP Security
 
Libreplanet2012
Libreplanet2012Libreplanet2012
Libreplanet2012
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 
Communication Privacy for Free Societies at Harvard
Communication Privacy for Free Societies at HarvardCommunication Privacy for Free Societies at Harvard
Communication Privacy for Free Societies at Harvard
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsRainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
 
Fortinet av
Fortinet avFortinet av
Fortinet av
 
Network Security Through FIREWALL
Network Security Through FIREWALLNetwork Security Through FIREWALL
Network Security Through FIREWALL
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P...
 Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P... Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P...
Vladimir ’mend0za’ Shakhov — Linux firmware for iRMC controller on Fujitsu P...
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 

Ähnlich wie Silc

Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Modelmayday1429
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Modelmayday1429
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Modelguestedf71bf
 
IoT Studio #1: Protocols introduction and connected jukebox
IoT Studio #1: Protocols introduction and connected jukeboxIoT Studio #1: Protocols introduction and connected jukebox
IoT Studio #1: Protocols introduction and connected jukeboxMickaël Rémond
 
6 Types of VPN Protocols You Should Know
6 Types of VPN Protocols You Should Know6 Types of VPN Protocols You Should Know
6 Types of VPN Protocols You Should KnowSPL VPN
 
WebRTC, Whats in it for me?
WebRTC, Whats in it for me?WebRTC, Whats in it for me?
WebRTC, Whats in it for me?SeanDuBois3
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layerTahmina Shopna
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionCSCJournals
 
Stay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfStay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfTEWMAGAZINE
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
Marmon Glenn
Marmon GlennMarmon Glenn
Marmon GlennCarl Ford
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 

Ähnlich wie Silc (20)

protocols.pptx
protocols.pptxprotocols.pptx
protocols.pptx
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Model
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Model
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Model
 
IoT Studio #1: Protocols introduction and connected jukebox
IoT Studio #1: Protocols introduction and connected jukeboxIoT Studio #1: Protocols introduction and connected jukebox
IoT Studio #1: Protocols introduction and connected jukebox
 
TCP_IP.pptx
TCP_IP.pptxTCP_IP.pptx
TCP_IP.pptx
 
R43019698
R43019698R43019698
R43019698
 
6 Types of VPN Protocols You Should Know
6 Types of VPN Protocols You Should Know6 Types of VPN Protocols You Should Know
6 Types of VPN Protocols You Should Know
 
WebRTC, Whats in it for me?
WebRTC, Whats in it for me?WebRTC, Whats in it for me?
WebRTC, Whats in it for me?
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
Stay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfStay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdf
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Marmon Glenn
Marmon GlennMarmon Glenn
Marmon Glenn
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Skype
SkypeSkype
Skype
 

Mehr von Mayank Saxena (19)

operating system
operating systemoperating system
operating system
 
operating system
operating systemoperating system
operating system
 
Financial services marketing
Financial services marketingFinancial services marketing
Financial services marketing
 
Introduction to financial service
Introduction to financial serviceIntroduction to financial service
Introduction to financial service
 
il&fs investmart
 il&fs investmart il&fs investmart
il&fs investmart
 
financial services
financial servicesfinancial services
financial services
 
Array
ArrayArray
Array
 
Html tutorial.02
Html tutorial.02Html tutorial.02
Html tutorial.02
 
Introduction html
Introduction htmlIntroduction html
Introduction html
 
Steganography
SteganographySteganography
Steganography
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Vlan
VlanVlan
Vlan
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Silc
SilcSilc
Silc
 
Wi fi
Wi fiWi fi
Wi fi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
4 g world
4 g world4 g world
4 g world
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 

Silc

  • 1. 1
  • 2.  Stands for Secure Internet Live Conferencing.  Designed as a secure replacement for IRC (Internet Relay Chat).  Stable implementations for clients and server Also has some features of instant messangers are available. 2
  • 3.  Designed by Pekka Riikonen, started '96.  Work stopped several times.  1st public release in 2000.  Silc-client 1.0 oct. 2003.  Currently maturing of protocol.  Protocol specs submitted to IETF, currently in a draft phase (will become RFC soon).(Internet eng.task force)  Version 1 of silc, toolkit to follow soon. 3
  • 4.  Protocol for authenticated and encrypted  Live Conferencing  Supports chat and instant messenger like systems. 4
  • 5.  Instant Messaging [IM]  Internet Relay Chat [IRC]  Extensible Messaging And Presence Protocol [EMPP]  Secure Internet Live Conferencing [SILC] 5
  • 6.  Instant messaging (IM) is a collection of technologies used for real-time text-based communication between two or more participants over the Internet, or other types of networks  Weakness :-  Security risks  Compliance risks  Inappropriate use 6
  • 7.  Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing.  It is mainly designed for group communication.  Weakness :- IRC connections are usually unencrypted and typically span long time periods, they are an attractive target for hackers. 7
  • 8.  EMPP is an open-standard communications protocol for message-oriented middleware based on XML.(extensible markup language).  Systems approach of development and application.  Google Wave's federation protocol is an extension to the EMPP protocol.  Weaknesses:-  Presence data overhead  In-band binary data transfer is inefficient 8
  • 9. Key-Features:  All messages are encrypted and authenticated.  Keys managed by server or user.  Messages are sent through server-net.  File transfer via SFTP. 9
  • 11. 11
  • 12.  SILC PACKET PROTOCOL  SILC KEY EXCHANGE [SKE] PROTOCOL  SILC CONNECTION AUTHENTICATION PROTOCOL 12
  • 13. 13
  • 14.  The file transfer support in chat protocols are a absolute requirement nowadays, and chat protocol without one is no chat protocol at all.  The support for file transfer in SILC has been designed so that using practically any file transfer protocol is possible.  The file transfer protocol used in SILC protocol is the SSH File Transfer protocol (SFTP). 14
  • 15.  The Secure Internet Live Conferencing (SILC) protocol is a new generation chat protocol that provides all the common conferencing services with strong support for security. It has wide range of security properties that should meet the highest levels of security requirements, while not forgetting easy of use. The network topology offers new architectural solution with better scalability over traditional chat protocols. 15
  • 16. 16