The document provides an overview of the SSL (Secure Sockets Layer) protocol, its role in internet security, and its evolution into TLS (Transport Layer Security). It outlines the SSL handshake mechanism, the importance of HTTPS for secure web communication, and the advancements in security through the development of TLS. The conclusion emphasizes the ongoing need for robust encryption technologies and data privacy in securing digital communications.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
2 views
Ssl Protocols(New)
The document provides an overview of the SSL (Secure Sockets Layer) protocol, its role in internet security, and its evolution into TLS (Transport Layer Security). It outlines the SSL handshake mechanism, the importance of HTTPS for secure web communication, and the advancements in security through the development of TLS. The conclusion emphasizes the ongoing need for robust encryption technologies and data privacy in securing digital communications.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
CN – SSL PROTOCOL
• MADE BY –
Name Roll NO PRN
Vijay varia 56 1032240015
Priyanshu paul 57 1032240209
Kiran Satote 55 1032240005
Abhishek Tiwari 51 1032240013
# Understanding SSL: Secure Sockets Layer Internet security protocol created by Netscape in 1995. It provides encryption, authentication, and data integrity. SSL is the predecessor to modern Transport Layer Security (TLS). • The following lie on the transport layer:
- TCP - UDP - SSL - TLS - SPX
When you access the website using
your explorer, HTTP is at work on application layer. SSL is being used to encapsulate the HTTP traffic, at the transport layer. SSL at the transport layer encrypts the HTTP traffic coming from the application layer. OSI Model Position SSL enhances security by encrypting data. Operates at layer 6, the presentation layer. 1. The client sends a request to the server for a secure session. The server responds by sending its X.509 digital certificate to the client. 2. The client receives the server's X.509 digital certificate. (An X.509 digital certificate is a widely used standard for encoding and exchanging public key certificates, used to verify the identity of entities (users, devices, or services) in digital communications and transactions) 3. The client authenticates the server, using a list of known certificate authorities. 4. The client generates a random symmetric key and encrypts it using server's public key. 5. The client and server now both know the symmetric key and can use the SSL encryption process to encrypt and decrypt the information contained in the client request and the server response. # SSL Handshake Mechanism The client initiates a secure connection request and the server presents a digital certificate. A mutual authentication process establishes an encrypted communication tunnel. 1. (HTTPS): Securing Web Communication •• • •• •• • • 1. Securing Web Communication (HTTPS): • Encryption: • SSL/TLS encrypts data transmitted between a web browser and a website server, making it unreadable to eavesdroppers. • Authentication: • It authenticates the server to the client, ensuring the user is communicating with the legitimate website and not a fake one. • HTTPS: • SSL/TLS is the foundation of HTTPS, the secure version of HTTP, which is indicated by the "https://" prefix in a web address. • Examples: • Online banking, e-commerce transactions, and any website handling sensitive data relies on SSL/TLS to protect user information. Advancements in Security TLS is now the standard protocol for securing websites and online communications, with older versions of SSL no longer recommended TLS has evolved through versions 1.0, 1.1, 1.2, and 1.3, with each version offering improvements in security and performance TLS offers stronger encryption algorithms and enhanced security features compared to SSL TLS is the successor to SSL, addressing the security weaknesses of its predecessor. # Conclusion: The Future of Secure Communications Ongoing development of encryption technologies. Increasing importance of data privacy as well as challenges in maintaining robust security protocols. Securing our digital world for the future.