0% found this document useful (0 votes)
52 views

Internet Security Protocols

This document discusses internet security protocols such as SSL (Secure Sockets Layer). It provides details on how SSL works to securely exchange information between a web browser and server through authentication and encryption. SSL establishes an encrypted connection through a three-step handshake process where the client and server authenticate each other and exchange encryption keys before sending application data back and forth.

Uploaded by

Mehar Shree
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Internet Security Protocols

This document discusses internet security protocols such as SSL (Secure Sockets Layer). It provides details on how SSL works to securely exchange information between a web browser and server through authentication and encryption. SSL establishes an encrypted connection through a three-step handshake process where the client and server authenticate each other and exchange encryption keys before sending application data back and forth.

Uploaded by

Mehar Shree
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Internet Security Protocols

--Amarjeet Singh Chauhan


Online Payment
• Cards(Debit/Credit Card)
• Virtual Wallets(PayTM and others)
• United Payment Interface(UPI)
Online Payments Security Issues
• Credit card losses
• Bank Account Exploitation
SSL(Secure Socket Layer)
• It is an Internet Protocol for secure exchange
of information between a web browser and
web server.
• Developed in 1994 by Netscape Corportion.
• It provides basic two security services:
- Authentication
- Confidentiality
SSL in TCP/IP Protocol suite
Application Layer

SSL Layer

Transport Layer

Network Layer

Data link Layer

Physical Layer
How SSL works?
• SSL has three sub protocols:
- Handshake Protocol
- Record Protocols
- Alert Protocols
Handshake Protocol

1. Client request to Server


2. Server authentication and
Web Browser key exchange Web Server
3. Client authentication and
key exchange
Record Protocol

Application Data Fragmentation Compression

Append Header Encryption Addition of MAC


Alert Protocol
• When either the client or the server detects
an error, the detecting party send an alert
message to the other party.
• If the error is fatal, both the parties close the
SSL connection.
• Each alert message consist of two bytes.
Alert Messages
• Unexpected messages
• Bad Record MAC
• Decompression failure
• Handshake failure
• Illegal parameters

You might also like