+ All Categories
Home > Education > Secure Socket Layer

Secure Socket Layer

Date post: 15-Jul-2015
Category:
Upload: dwitigajab
View: 199 times
Download: 0 times
Share this document with a friend
Popular Tags:
18
1 05/26/12 Secure Socket Layer” Project Presentation by: Dwiti Gajab Mihir Trivedi Aman Chaurasia
Transcript

105/26/12

“Secure Socket Layer”Project Presentation by:

Dwiti Gajab

Mihir Trivedi

Aman Chaurasia

205/26/12

Contents: Cryptography and Secure Socket Layer

(SSL)

Establishment of Secured connection for “Encryption”

Briefing on Asymmetric Encryption algorithms

305/26/12

Cryptography:

Security and Integrity

Encryption helps in achieving this.

SSL is one such type of protocols. Its two main functions are:

Encryption

Identification

405/26/12

Why SSL exists?

505/26/12

SSL Architecture:

605/26/12

Few terms: Certificate:

- It is used to authenticate the website.

- Issued by Certificate Authority (CA).

- Mainly contains: Public Key Digital Signature

Hashing:

- It is a process that compresses text to a single number.

- Used in a certificate and in SSL handshaking.

705/26/12

Data Transfer:

Asymmetric Data Transfer- Used in handshaking- Two Keys are involved:

Public Key: It is used to encrypt. Private Key: It is used to decrypt.

Symmetric Data Transfer

Used in application data transfer. Same key is used in encryption & decryption.

805/26/12

SSL Handshaking:

905/26/12

Encryption Algorithms:

RC4

AES

HMAC- SHATriple DESDiffie Hellman

HAC- MD5DESRSA

HashCipherKey

A B

RC4

AES

HMAC- SHATriple DESDiffie Hellman

HAC- MD5DESRSA

HashCipherKey

Computers agree how to encrypt !

1005/26/12

1105/26/12

1205/26/12

1305/26/12

1405/26/12

1505/26/12

Asymmetric Key Cryptography: Diffi Hellman algorithm Rivest, Shamir and Adleman (RSA) algorithm

1605/26/12

Symmetric key Cryptography:

Used for encryption of data.

Substitution/Transposition/Simple round ciphers.

Modern round ciphers: DES, Triple DES, AES

1705/26/12

Future Scope:

Development of RSA algorithm for better security.

References:

Data communication and Networking, 4E, by Behrouz A. Forouzan

Computer Networks by Ross & Kurose Network Security IOS by CISCO. http://en.wikipedia.org/wiki/Secure_Sockets_Layer http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html

1805/26/12

Any Questions???

Thank You…


Recommended