O SlideShare utiliza cookies para otimizar a funcionalidade e o desempenho do site, assim como para apresentar publicidade mais relevante aos nossos usuários. Se você continuar a navegar o site, você aceita o uso de cookies. Leia nosso Contrato do Usuário e nossa Política de Privacidade.
O SlideShare utiliza cookies para otimizar a funcionalidade e o desempenho do site, assim como para apresentar publicidade mais relevante aos nossos usuários. Se você continuar a utilizar o site, você aceita o uso de cookies. Leia nossa Política de Privacidade e nosso Contrato do Usuário para obter mais detalhes.
(SECURE SOCKET LAYER)
MONODIP SINGHA ROY
Dr. B.C.ROY ENGINEERING COLLEGE
WEB SECURITY TERMINOLOGY
SSL ( SECURE SOCKET LAYER )
TLS ( TRANSPORT LAYER
PROS AND CONS OF SSL/TLS
Almost everything in today’s world
relies on computer and internet.
◦ Communications (emails, phones)
◦ Transportation (car engine system,
airplane navigation system)
◦ Medicine ( medical records, equipments)
◦ Shopping (online store, online payments)
◦ Entertainment (digital cables)
What is WEB SECURITY ??
Web security , also known as “cyber
security “ involves protecting the
information by protecting , preventing
and responding to the attacks.
HACKERS: People who strive to
exploit weaknesses in software and
computer for their own gain.
VIRUSES: Infects your computer
before actually u can do something.
WORMS: Propagates without users
TROJAN: A software that claims to do
something while in fact doing
something in background.
◦ A form of Trojan that has been since
1989, as known as ‘PC CYBORG’ Trojan.
◦ It affects the user computer by encrypting
the user’s personal files.
◦ The victim then contacted and offered the
decrypt key in exchange of cash.
◦ It is an software that monitor users activity
such as key typed in keyboard.
◦ KeyLoggers can
Record keystrokes on keyboards.
Record mouse movement and clicks.
Record menus that are invoked.
Takes screenshot of the desktop at pre defined
Web now widely used by business,
but Internet & Web are vulnerable
have a variety of threats
◦ denial of service
need added security mechanisms.
What is SSL?
SSL – Secure Socket Layer ƒit provides a secure
transport connection between applications (e.g., a
web server and a browser)
SSL was developed by Netscape
uses TCP to provide a reliable end-to-end service
SSL has two layers of protocols SSL v3.0 was
specified in an Internet Draft (1996) ƒit evolved into
RFC 246 and was renamed to TLS (Transport
TLS can be viewed as SSL v3.1
• Negotiation of
• Key exchange.
• Error message (
fatal alerts and
• A single
indicates the end
Sessions and Connections
An SSL session is a connection between
client and server.
Sessions are stateful ; the session state
includes security algorithm and parameters.
A session may include multiple secure
connection between same server and
Connections of the same session share the
Sessions are used to avoid expensive
negotiation of new security parameters for
◦ Session identifier – arbitrary byte
sequence chosen by the server to identify
◦ Peer certificate – may be null.
◦ Compression method.
◦ Cipher Spec – bulk data encryption
algorithm and MAC algorithm ( eg. DES,
◦ Master key – a 48 byte secret key is used
in between client and server.
◦ Resumable – a flag indicating whether the
session can be used to initiate new
◦ Server and client random – random byte
sequence is chosen by the client and server
for new connection.
◦ Server write MAC secret – secret key is used
in MAC operations on data sent by the
◦ Client write MAC secret – secret key is used
in MAC operations on data sent by the client.
◦ Server write key – secret encryption key for
data, encrypted by the server.
◦ Client write key – secret encryption key for
data, encrypted by the client.
How States changes??
Operating state: current using state
Pending state: state to be used
Operating state < Pending state: at
the transmission and reception of
change cipher spec message
part of the
part of the
◦ an association between client & server
◦ created by the Handshake Protocol
◦ define a set of cryptographic parameters
◦ may be shared by multiple SSL
◦ a transient, peer-to-peer, communications
◦ associated with 1 SSL session
SSL Handshake Protocol
Handshake protocol is used to
exchange all the information required
by both sides for the exchange of
actual application data by the
TRANSPORT LAYER SECURITY
SSL Record Protocol
◦ using symmetric encryption with a shared
secret key defined by Handshake Protocol
◦ IDEA, RC2-40, DES-40, DES, 3DES,
Fortezza, RC4-40, RC4-128
◦ message is compressed before
◦ using a MAC with shared secret key
◦ similar to HMAC but with different padding
SSL Change Cipher Spec Protocol
one of 3 SSL specific protocols which
use the SSL Record protocol
a single message
causes pending state to become
hence updating the cipher suite in use.
SSL Alert Protocol
conveys SSL-related alerts to peer entity
warning or fatal
unexpected message, bad record mac, decompression
failure, handshake failure, illegal parameter
close notify, no certificate, bad certificate, unsupported
certificate, certificate revoked, certificate expired,
compressed & encrypted like all SSL data
What is TSL??
Internet Engineering Task Force
standard RFC 2246 similar to SSLv3
with minor differences:
◦ In record format version number
◦ Uses HMAC for MAC
◦ Has optional alert code
◦ Some changes in supported ciphers
◦ Change in use of certificate negotiation
◦ Change in use of padding
Changes from SSLv3 to
Additional alerts added
Modification of hash calculation
Protocol version 3.1 in client hello,
TLS : Privacy
Encrypt message so it cannot be read
Use conventional cryptography with
◦ DES , 3DES
◦ RC2, RC4
A (Message) $@#&!@
TLS: Key Exchange
Need secure method to exchange key
Use public key encryption for this
Choices are RSA & Diffie-Hellman
Compute fixed length message
authentication code (MAC)
◦ Includes hash of message
◦ Includes a shared secret key
◦ Includes sequence number
◦ Transmit MAC with message
TLS : Authentication
Verify identities of participants
Client authentication is optional
Certificate is used to associate identity
with public key and other attributes
TLS: HTTP Application
HTTP is most common TLS
Requires TLS-capable web server
Requires TLS-capable web browser
◦ Netscape navigator
◦ Internet explorer
Implementation of SSL/TLS
SSL & TLS have widely been
◦ Open source software projects (
openSSL, NSS & GnuTLS)
◦ Microsoft windows : part of its secure
Pros & Cons of SSL/TLS
◦ Customer will trust your website: many
visitors are now savvy enough to
recognize when a webpage is encrypted
and protected by SSL.
◦ Avoid dispute due to credit/debit card
frauds: visitors uses their credit/debit
cards information's on unprotected
servers and faces identity theft.
◦ Regular renewal : just like website domain
and hosting plan, SSL certificates also
expires after short period of time ; usually
one to five years.
◦ Complex installation : SSL is very difficult
to install on websites for those who are
unaware of website development.
Application of SSL/TLS
On top of the Transport layer protocols
◦ Primarily with TCP
◦ Datagram transport layer security (DTLS)
Encapsulating the applications
◦ Securing WWW traffic
◦ FTP, SMTP, etc
SSL/TLS address the need for
security in internet communications
◦ Privacy – conventional encryption
◦ Integrity – message authentication codes
◦ Authentication – X.509
SSL in use today with web browsers