SlideShare a Scribd company logo
SSL: SECURED SOCKET LAYER Presented by: Sheikh Shaer Hassan Taj Islam Mohammad Mahfuzur Rahman  Khaled Md. Imran www.nascenia.com
BACKGROUND WHY AND HOW HOW TO CHECK IN THE BROWSER.
MAIN CONCERNS SSL is a Secure Sockets Layer and SSL is the standard security technology for establishing an encrypted link between a web server and a browser.  This link ensures that all data passed between the web server and browsers remain private and integral
Authentication of server How does client know who they are dealing with? Information integrity How do we know third party has not altered data en route? Change so item shipped to Darth Address information Bob’s web site Alice thinks she is at Bob’s site, but Darth is spoofing it Bob’s web site
SSL HISTORY Netscape developed The Secure Sockets Layer Protocol (SSL) in 1994, as a response to the growing concern over security on the Internet.  SSL was originally developed for securing web browser and server communications.
SSL VERSION There are several versions of the SSL protocol defined. The latest version, the Transport Layer Security Protocol (TLS), is based on SSL 3.0  SSL Version 1.0  SSL Version 2.0  SSL Version 3.0  TLS Version 1.0  TLS Version 1.0 with SSL Version 3.0 compatibility
HOW IT WORKS Encryption of sensitive data like DES,RSA algorithm  Sent between client and server through Certification like very sign
HOW IT WORKS IN BROWSER: HTTP www.aiub.edu
HOW IT WORKS IN BROWSER: HTTPS www.gmail.com
HOW IT WORKS IN BROWSER: HTTPS WITHOUT CERTIFICATION https://www.varsityadmission.com/
HOW IT WORKS IN BROWSER: HTTPS WITHOUT CERTIFICATION
OVERALL PROCESS AND FIRST FOUR STEPS
CERTIFICATES Web sites that deal in ecommerce must have  certificates  for authentication Installed at  server Transmitted to  client  for authentication Validated using CA’s public key  Client machine Browser Request for secure session Server machine Web Container (JSP, ASP) Certificate signed by CA CA
SECURE SOCKET LAYER PROTOCOL Secure Socket Layer  protocol for web communication Latest upgrade: Transport Layer Security (TLS) Same structure as SSL, somewhat more secure
SSL PROTOCOL: PHASE 1 Phase 1:  Information exchange Problem: Large number of encryption algorithms in use How do client and server agree on which to use? How does client tell server which ones it supports?
SSL PROTOCOL: PHASE 1 Client passes  preferred algorithms  to server via  https request Public key encryption algorithms Private key encryption algorithms Hash algorithms Compression algorithms Also random number for key generation Server replies with algorithms that will be used Also passes own random number
SSL PROTOCOL: PHASE 2 Phase 2:  Server Identification and Key Exchange Server passes their  certificates  to client Client uses issuer public key to verify identity Client retrieves server public key from certificate Server may pass  many  certificates for authentication
SSL PROTOCOL: PHASE 2 If no certificate containing a public key, separate public key must be passed Certificate contains RSA public key, so no separate key passed No certificate, so Diffie-Hellman key exchange parameters passed
SSL PROTOCOL: PHASE 2 Server can also request appropriate  client certificates  to authenticate client Online banking Remote access to company database
SSL PROTOCOL: PHASE 3 Phase 3:  Client Identification and Key Exchange Client sends certificate or public key if requested by server
SSL KEY GENERATION Client generates “pre-master key” Sends to client encrypted with server public key Client and server use to generate  master key  used to create cipher keys Also use client, server random numbers exchanged in phase 1
SSL KEY GENERATION
SSL KEY GENERATION
SSL KEY GENERATION Key material used to generate: Keys for encryption and authentication (MAC) IV’s for block cipher chaining
PHASE 4: FINAL HANDSHAKE Client and server verify protocols and keys Sender  signs/encrypts  “finished”  message Receiver  decrypts/verifies  message to  confirm keys
SSL DATA TRANSMISSION Message broken into blocks Block compressed Compressed block hashed with authentication key to get MAC (message integrity) Compressed block + MAC encrypted with cipher key Encrypted block + record protocol header with version/length information sent
SSL DATA TRANSMISSION MAC algorithm is modified   HMAC Two stage hash with secret MAC key inserted at each stage Values similar to IPAD and OPAD also inserted
SSL DATA TRANSMISSION ALGORITHM USED CERTIFICATE]ION AUTHORITY SSL IN BANGLADESH
ALGORITHM USED DES.  Data Encryption Standard, an encryption algorithm used by the U.S. Government. DSA.  Digital Signature Algorithm, part of the digital authentication standard used by the U.S. Government. KEA.  Key Exchange Algorithm, an algorithm used for key exchange by the U.S. Government. MD5.  Message Digest algorithm developed by Rivest. RC2 and RC4 . Rivest encryption ciphers developed for RSA Data Security. RSA.  A public-key algorithm for both encryption and authentication. Developed by Rivest, Shamir, and Adleman. RSA key exchange.  A key-exchange algorithm for SSL based on the RSA algorithm. SHA-1.  Secure Hash Algorithm, a hash function used by the U.S. Government. SKIPJACK.  A classified symmetric-key algorithm implemented in FORTEZZA-compliant hardware used by the U.S. Government. (For more information, see FORTEZZA Cipher Suites.) Triple-DES.  DES applied three times.
CERTIFICATION AUTHORITY 50 root certificate authority worldwide Needs to listed on browsers.  Undergo annual security audit (e.g. by Webtrust). The large authorities are Verisign (acquired Thawte and Geotrust) has 48 %, GoDaddy 23%, and Combodo 15%, others 14%
 
IN BANGLADESH SSL Wireless provides Verisign certification: www.sslwireless.com
CODING DIFFERENT VERSIONS OF SSL
OPENSSL OpenSSL is an open source implementation of the SSL and TLS protocols. The core library (written in the C programming language) implements the basic cryptographic functions and provides various utility functions.
OVERVIEW OF SSL APPLICATION WITH OPENSSL APIS
INITIALIZATION SSL_library_init(); /* load encryption & hash algorithms for SSL */   SSL_load_error_strings();   /* load the error strings for good error reporting */   meth = SSLv3_method(); ctx = SSL_CTX_new(meth);   /*creates a new  SSL_CTX  object as framework to establish TLS/SSL enabled connections */
CERTIFICATE VERIFICATION IN THE CLIENT SIDE   err = SSL_connect(ssl); /*  initiates the TLS/SSL handshake  */ if(SSL_get_peer_certificate(ssl) != NULL) { if(SSL_get_verify_result(ssl) == X509_V_OK) BIO_printf(bio_c_out, "client verification with SSL_get_verify_result()  succeeded.\n");  else{ BIO_printf(bio_err, "client verification with SSL_get_verify_result()  failed.\n"); exit(1); } } else BIO_printf(bio_c_out, -the peer certificate was not presented.\n-);
SSL HANDSHAKE The SSL handshake is a complicated process that involves significant cryptographic key exchanges. However, the handshake can be completed by calling  SSL_accept () on the SSL server and  SSL_connect () on the SSL client.  The  SSL_accept () API waits for an SSL handshake initiation from the SSL client. On server side- err =  SSL_accept(ssl); On client side- err = SSL_connect(ssl);
SSL VERSIONS Version 1.0 was never publicly released; version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0"  SSL Version 1.0 SSL Version 2.0 SSL Version 3.0 TLS version 1.0 TLS version 1.1 TLS version 1.2
FLAWS OF SSL 2.0 Identical cryptographic keys are used for message authentication and encryption. SSL v2 has a weak MAC construction and relies solely on the MD5 hash function. SSL v2 does not have any protection for the handshake, meaning a man-in-the-middle downgrade attack can go undetected.
SSL VERSION 3.0 VERSUS SSL VERSION 2.0   Uses SHA-1 instead of MD5:  The SHA-1 hashing algorithm is considered to be more secure than the MD5 hashing algorithm. Having SHA-1 allows SSL Version 3.0 to support additional cipher suites which use SHA-1 instead of MD5. Reduces MITM attack:  SSL Version 3.0 protocol reduces man-in-the-middle (MITM) type of attacks from occurring during SSL handshake processing. In SSL Version 2.0, it was possible, though unlikely, that a MITM attack could accomplish cipher specification weakening.
SOURCES USED Cryptography and Network Security, Principles and Practices, 4 th  Ed., William Stallings www.wikipedia.com A few other internet resources
THANK YOU

More Related Content

What's hot (20)

PPT
Acl
Raghu Kiran
 
PPTX
Intrusion prevention system(ips)
Papun Papun
 
PPTX
Digital signature(Cryptography)
Soham Kansodaria
 
PDF
SSL intro
Three Lee
 
PDF
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
PPT
SSL Communication and Mutual Authentication
Cleo
 
PPT
Ipsec
Rupesh Mishra
 
ODP
Https presentation
patel jatin
 
PPT
Ssl (Secure Sockets Layer)
Asad Ali
 
PPTX
ip security
Chirag Patel
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPT
Secure Socket Layer (SSL)
amanchaurasia
 
PDF
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
PPTX
secure socket layer
Amar Shah
 
PPTX
TLS - Transport Layer Security
ByronKimani
 
PPTX
Http Vs Https .
simplyharshad
 
PPSX
Secure socket layer
Nishant Pahad
 
PPTX
Firewall Design and Implementation
ajeet singh
 
PDF
Http methods
maamir farooq
 
PPTX
Transport layer security (tls)
Kalpesh Kalekar
 
Intrusion prevention system(ips)
Papun Papun
 
Digital signature(Cryptography)
Soham Kansodaria
 
SSL intro
Three Lee
 
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
SSL Communication and Mutual Authentication
Cleo
 
Https presentation
patel jatin
 
Ssl (Secure Sockets Layer)
Asad Ali
 
ip security
Chirag Patel
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
Secure Socket Layer (SSL)
amanchaurasia
 
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
secure socket layer
Amar Shah
 
TLS - Transport Layer Security
ByronKimani
 
Http Vs Https .
simplyharshad
 
Secure socket layer
Nishant Pahad
 
Firewall Design and Implementation
ajeet singh
 
Http methods
maamir farooq
 
Transport layer security (tls)
Kalpesh Kalekar
 

Viewers also liked (7)

PPT
Secure Socket Layer
Naveen Kumar
 
PPT
SSL & TLS Architecture short
Avirot Mitamura
 
PPTX
Http Proxy Server
Sourav Roy
 
PPTX
Proxy Presentation
primeteacher32
 
PPT
Proxy Servers
Sourav Roy
 
PPT
Proxy Server
guest095022
 
Secure Socket Layer
Naveen Kumar
 
SSL & TLS Architecture short
Avirot Mitamura
 
Http Proxy Server
Sourav Roy
 
Proxy Presentation
primeteacher32
 
Proxy Servers
Sourav Roy
 
Proxy Server
guest095022
 
Ad

Similar to Introduction to Secure Sockets Layer (20)

PDF
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
 
PPTX
Secure Socket Layer (SSL)
Samip jain
 
PPTX
The last picks
Nafiur Rahman Tuhin
 
PPTX
Sequere socket Layer
Raghavendra Rao
 
PPTX
Secure Sockets Layer (SSL)
BGSBU Rajouri
 
PPT
SecureSocketLayer.ppt
PranavUndre1
 
PPTX
Secure socket layer
BU
 
PPSX
Secure socket layer
Nishant Pahad
 
PPT
Secure socket later
Muhammad Ahmad Nazar
 
PPT
SSL.ppt
TXCDHRUV
 
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
DOCX
What is TLS/SSL?
Shehzad Imran
 
PDF
Improving the Secure Socket Layer by Modifying the RSA Algorithm
IJCSEA Journal
 
PDF
Details about the SSL Certificate
CheapSSLUSA
 
PPTX
group no 6.pptx
NIRAJSINGH339856
 
DOC
Demonstration of secure socket layer(synopsis)
Mumbai Academisc
 
PPTX
Certificate pinning in android applications
Arash Ramez
 
PDF
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
 
Secure Socket Layer (SSL)
Samip jain
 
The last picks
Nafiur Rahman Tuhin
 
Sequere socket Layer
Raghavendra Rao
 
Secure Sockets Layer (SSL)
BGSBU Rajouri
 
SecureSocketLayer.ppt
PranavUndre1
 
Secure socket layer
BU
 
Secure socket layer
Nishant Pahad
 
Secure socket later
Muhammad Ahmad Nazar
 
SSL.ppt
TXCDHRUV
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
What is TLS/SSL?
Shehzad Imran
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
IJCSEA Journal
 
Details about the SSL Certificate
CheapSSLUSA
 
group no 6.pptx
NIRAJSINGH339856
 
Demonstration of secure socket layer(synopsis)
Mumbai Academisc
 
Certificate pinning in android applications
Arash Ramez
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
Ad

More from Nascenia IT (20)

PPTX
Exploring DeepSeek A Hands-On Dive & How to Adapt the AI Surge.pptx
Nascenia IT
 
PPTX
AI Tools for Productivity: Exploring Prompt Engineering and Key Features
Nascenia IT
 
PDF
Introduction to basic data analytics tools
Nascenia IT
 
PPTX
Communication workshop in nascenia
Nascenia IT
 
PPTX
The Art of Statistical Deception
Nascenia IT
 
PDF
করোনায় কী করি!
Nascenia IT
 
PPTX
GDPR compliance expectations from the development team
Nascenia IT
 
PPTX
Writing Clean Code
Nascenia IT
 
PPTX
History & Introduction of Neural Network and use of it in Computer Vision
Nascenia IT
 
PPTX
Ruby on Rails: Coding Guideline
Nascenia IT
 
PPTX
iphone 11 new features
Nascenia IT
 
PPTX
Software quality assurance and cyber security
Nascenia IT
 
PPTX
Job Market Scenario For Freshers
Nascenia IT
 
PPTX
Modern Frontend Technologies (BEM, Retina)
Nascenia IT
 
PPTX
CSS for Developers
Nascenia IT
 
PPTX
Big commerce app development
Nascenia IT
 
PPTX
Integrating QuickBooks Desktop with Rails Application
Nascenia IT
 
PPTX
Shopify
Nascenia IT
 
PPTX
TypeScript: Basic Features and Compilation Guide
Nascenia IT
 
PPTX
Clean code
Nascenia IT
 
Exploring DeepSeek A Hands-On Dive & How to Adapt the AI Surge.pptx
Nascenia IT
 
AI Tools for Productivity: Exploring Prompt Engineering and Key Features
Nascenia IT
 
Introduction to basic data analytics tools
Nascenia IT
 
Communication workshop in nascenia
Nascenia IT
 
The Art of Statistical Deception
Nascenia IT
 
করোনায় কী করি!
Nascenia IT
 
GDPR compliance expectations from the development team
Nascenia IT
 
Writing Clean Code
Nascenia IT
 
History & Introduction of Neural Network and use of it in Computer Vision
Nascenia IT
 
Ruby on Rails: Coding Guideline
Nascenia IT
 
iphone 11 new features
Nascenia IT
 
Software quality assurance and cyber security
Nascenia IT
 
Job Market Scenario For Freshers
Nascenia IT
 
Modern Frontend Technologies (BEM, Retina)
Nascenia IT
 
CSS for Developers
Nascenia IT
 
Big commerce app development
Nascenia IT
 
Integrating QuickBooks Desktop with Rails Application
Nascenia IT
 
Shopify
Nascenia IT
 
TypeScript: Basic Features and Compilation Guide
Nascenia IT
 
Clean code
Nascenia IT
 

Recently uploaded (20)

PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 

Introduction to Secure Sockets Layer

  • 1. SSL: SECURED SOCKET LAYER Presented by: Sheikh Shaer Hassan Taj Islam Mohammad Mahfuzur Rahman Khaled Md. Imran www.nascenia.com
  • 2. BACKGROUND WHY AND HOW HOW TO CHECK IN THE BROWSER.
  • 3. MAIN CONCERNS SSL is a Secure Sockets Layer and SSL is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral
  • 4. Authentication of server How does client know who they are dealing with? Information integrity How do we know third party has not altered data en route? Change so item shipped to Darth Address information Bob’s web site Alice thinks she is at Bob’s site, but Darth is spoofing it Bob’s web site
  • 5. SSL HISTORY Netscape developed The Secure Sockets Layer Protocol (SSL) in 1994, as a response to the growing concern over security on the Internet. SSL was originally developed for securing web browser and server communications.
  • 6. SSL VERSION There are several versions of the SSL protocol defined. The latest version, the Transport Layer Security Protocol (TLS), is based on SSL 3.0 SSL Version 1.0 SSL Version 2.0 SSL Version 3.0 TLS Version 1.0 TLS Version 1.0 with SSL Version 3.0 compatibility
  • 7. HOW IT WORKS Encryption of sensitive data like DES,RSA algorithm Sent between client and server through Certification like very sign
  • 8. HOW IT WORKS IN BROWSER: HTTP www.aiub.edu
  • 9. HOW IT WORKS IN BROWSER: HTTPS www.gmail.com
  • 10. HOW IT WORKS IN BROWSER: HTTPS WITHOUT CERTIFICATION https://www.varsityadmission.com/
  • 11. HOW IT WORKS IN BROWSER: HTTPS WITHOUT CERTIFICATION
  • 12. OVERALL PROCESS AND FIRST FOUR STEPS
  • 13. CERTIFICATES Web sites that deal in ecommerce must have certificates for authentication Installed at server Transmitted to client for authentication Validated using CA’s public key Client machine Browser Request for secure session Server machine Web Container (JSP, ASP) Certificate signed by CA CA
  • 14. SECURE SOCKET LAYER PROTOCOL Secure Socket Layer protocol for web communication Latest upgrade: Transport Layer Security (TLS) Same structure as SSL, somewhat more secure
  • 15. SSL PROTOCOL: PHASE 1 Phase 1: Information exchange Problem: Large number of encryption algorithms in use How do client and server agree on which to use? How does client tell server which ones it supports?
  • 16. SSL PROTOCOL: PHASE 1 Client passes preferred algorithms to server via https request Public key encryption algorithms Private key encryption algorithms Hash algorithms Compression algorithms Also random number for key generation Server replies with algorithms that will be used Also passes own random number
  • 17. SSL PROTOCOL: PHASE 2 Phase 2: Server Identification and Key Exchange Server passes their certificates to client Client uses issuer public key to verify identity Client retrieves server public key from certificate Server may pass many certificates for authentication
  • 18. SSL PROTOCOL: PHASE 2 If no certificate containing a public key, separate public key must be passed Certificate contains RSA public key, so no separate key passed No certificate, so Diffie-Hellman key exchange parameters passed
  • 19. SSL PROTOCOL: PHASE 2 Server can also request appropriate client certificates to authenticate client Online banking Remote access to company database
  • 20. SSL PROTOCOL: PHASE 3 Phase 3: Client Identification and Key Exchange Client sends certificate or public key if requested by server
  • 21. SSL KEY GENERATION Client generates “pre-master key” Sends to client encrypted with server public key Client and server use to generate master key used to create cipher keys Also use client, server random numbers exchanged in phase 1
  • 24. SSL KEY GENERATION Key material used to generate: Keys for encryption and authentication (MAC) IV’s for block cipher chaining
  • 25. PHASE 4: FINAL HANDSHAKE Client and server verify protocols and keys Sender signs/encrypts “finished” message Receiver decrypts/verifies message to confirm keys
  • 26. SSL DATA TRANSMISSION Message broken into blocks Block compressed Compressed block hashed with authentication key to get MAC (message integrity) Compressed block + MAC encrypted with cipher key Encrypted block + record protocol header with version/length information sent
  • 27. SSL DATA TRANSMISSION MAC algorithm is modified HMAC Two stage hash with secret MAC key inserted at each stage Values similar to IPAD and OPAD also inserted
  • 28. SSL DATA TRANSMISSION ALGORITHM USED CERTIFICATE]ION AUTHORITY SSL IN BANGLADESH
  • 29. ALGORITHM USED DES. Data Encryption Standard, an encryption algorithm used by the U.S. Government. DSA. Digital Signature Algorithm, part of the digital authentication standard used by the U.S. Government. KEA. Key Exchange Algorithm, an algorithm used for key exchange by the U.S. Government. MD5. Message Digest algorithm developed by Rivest. RC2 and RC4 . Rivest encryption ciphers developed for RSA Data Security. RSA. A public-key algorithm for both encryption and authentication. Developed by Rivest, Shamir, and Adleman. RSA key exchange. A key-exchange algorithm for SSL based on the RSA algorithm. SHA-1. Secure Hash Algorithm, a hash function used by the U.S. Government. SKIPJACK. A classified symmetric-key algorithm implemented in FORTEZZA-compliant hardware used by the U.S. Government. (For more information, see FORTEZZA Cipher Suites.) Triple-DES. DES applied three times.
  • 30. CERTIFICATION AUTHORITY 50 root certificate authority worldwide Needs to listed on browsers. Undergo annual security audit (e.g. by Webtrust). The large authorities are Verisign (acquired Thawte and Geotrust) has 48 %, GoDaddy 23%, and Combodo 15%, others 14%
  • 31.  
  • 32. IN BANGLADESH SSL Wireless provides Verisign certification: www.sslwireless.com
  • 34. OPENSSL OpenSSL is an open source implementation of the SSL and TLS protocols. The core library (written in the C programming language) implements the basic cryptographic functions and provides various utility functions.
  • 35. OVERVIEW OF SSL APPLICATION WITH OPENSSL APIS
  • 36. INITIALIZATION SSL_library_init(); /* load encryption & hash algorithms for SSL */ SSL_load_error_strings(); /* load the error strings for good error reporting */ meth = SSLv3_method(); ctx = SSL_CTX_new(meth); /*creates a new SSL_CTX object as framework to establish TLS/SSL enabled connections */
  • 37. CERTIFICATE VERIFICATION IN THE CLIENT SIDE err = SSL_connect(ssl); /* initiates the TLS/SSL handshake */ if(SSL_get_peer_certificate(ssl) != NULL) { if(SSL_get_verify_result(ssl) == X509_V_OK) BIO_printf(bio_c_out, "client verification with SSL_get_verify_result() succeeded.\n"); else{ BIO_printf(bio_err, "client verification with SSL_get_verify_result() failed.\n"); exit(1); } } else BIO_printf(bio_c_out, -the peer certificate was not presented.\n-);
  • 38. SSL HANDSHAKE The SSL handshake is a complicated process that involves significant cryptographic key exchanges. However, the handshake can be completed by calling  SSL_accept () on the SSL server and  SSL_connect () on the SSL client. The  SSL_accept () API waits for an SSL handshake initiation from the SSL client. On server side- err = SSL_accept(ssl); On client side- err = SSL_connect(ssl);
  • 39. SSL VERSIONS Version 1.0 was never publicly released; version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0" SSL Version 1.0 SSL Version 2.0 SSL Version 3.0 TLS version 1.0 TLS version 1.1 TLS version 1.2
  • 40. FLAWS OF SSL 2.0 Identical cryptographic keys are used for message authentication and encryption. SSL v2 has a weak MAC construction and relies solely on the MD5 hash function. SSL v2 does not have any protection for the handshake, meaning a man-in-the-middle downgrade attack can go undetected.
  • 41. SSL VERSION 3.0 VERSUS SSL VERSION 2.0 Uses SHA-1 instead of MD5: The SHA-1 hashing algorithm is considered to be more secure than the MD5 hashing algorithm. Having SHA-1 allows SSL Version 3.0 to support additional cipher suites which use SHA-1 instead of MD5. Reduces MITM attack: SSL Version 3.0 protocol reduces man-in-the-middle (MITM) type of attacks from occurring during SSL handshake processing. In SSL Version 2.0, it was possible, though unlikely, that a MITM attack could accomplish cipher specification weakening.
  • 42. SOURCES USED Cryptography and Network Security, Principles and Practices, 4 th Ed., William Stallings www.wikipedia.com A few other internet resources