Top Banner
1 05/26/12 Secure Socket Layer” Project Presentation by: Dwiti Gajab Mihir Trivedi Aman Chaurasia
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure Socket Layer

105/26/12

“Secure Socket Layer”Project Presentation by:

Dwiti Gajab

Mihir Trivedi

Aman Chaurasia

Page 2: Secure Socket Layer

205/26/12

Contents: Cryptography and Secure Socket Layer

(SSL)

Establishment of Secured connection for “Encryption”

Briefing on Asymmetric Encryption algorithms

Page 3: Secure Socket Layer

305/26/12

Cryptography:

Security and Integrity

Encryption helps in achieving this.

SSL is one such type of protocols. Its two main functions are:

Encryption

Identification

Page 4: Secure Socket Layer

405/26/12

Why SSL exists?

Page 5: Secure Socket Layer

505/26/12

SSL Architecture:

Page 6: Secure Socket Layer

605/26/12

Few terms: Certificate:

- It is used to authenticate the website.

- Issued by Certificate Authority (CA).

- Mainly contains: Public Key Digital Signature

Hashing:

- It is a process that compresses text to a single number.

- Used in a certificate and in SSL handshaking.

Page 7: Secure Socket Layer

705/26/12

Data Transfer:

Asymmetric Data Transfer- Used in handshaking- Two Keys are involved:

Public Key: It is used to encrypt. Private Key: It is used to decrypt.

Symmetric Data Transfer

Used in application data transfer. Same key is used in encryption & decryption.

Page 8: Secure Socket Layer

805/26/12

SSL Handshaking:

Page 9: Secure Socket Layer

905/26/12

Encryption Algorithms:

RC4

AES

HMAC- SHATriple DESDiffie Hellman

HAC- MD5DESRSA

HashCipherKey

A B

RC4

AES

HMAC- SHATriple DESDiffie Hellman

HAC- MD5DESRSA

HashCipherKey

Computers agree how to encrypt !

Page 10: Secure Socket Layer

1005/26/12

Page 11: Secure Socket Layer

1105/26/12

Page 12: Secure Socket Layer

1205/26/12

Page 13: Secure Socket Layer

1305/26/12

Page 14: Secure Socket Layer

1405/26/12

Page 15: Secure Socket Layer

1505/26/12

Asymmetric Key Cryptography: Diffi Hellman algorithm Rivest, Shamir and Adleman (RSA) algorithm

Page 16: Secure Socket Layer

1605/26/12

Symmetric key Cryptography:

Used for encryption of data.

Substitution/Transposition/Simple round ciphers.

Modern round ciphers: DES, Triple DES, AES

Page 17: Secure Socket Layer

1705/26/12

Future Scope:

Development of RSA algorithm for better security.

References:

Data communication and Networking, 4E, by Behrouz A. Forouzan

Computer Networks by Ross & Kurose Network Security IOS by CISCO. http://en.wikipedia.org/wiki/Secure_Sockets_Layer http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html

Page 18: Secure Socket Layer

1805/26/12

Any Questions???

Thank You…