24
TLS/SSL PROTOCOL BY: KRUTHI BHARADWAJ KEERTHANA R

TLS/SSL PROTOCOL

Embed Size (px)

Citation preview

Page 1: TLS/SSL PROTOCOL

TLS/SSL PROTOCOL

BY:KRUTHI BHARADWAJKEERTHANA R

Page 2: TLS/SSL PROTOCOL

TLS PROTOCOL

Page 3: TLS/SSL PROTOCOL

•The Transport Layer Security (TLS) protocol was released in January 1999

•Allows client/server applications to communicate without eavesdropping, tampering or Message forgery

DEFINITION:

Page 4: TLS/SSL PROTOCOL

WHY DO WE NEED TLS PROTOCOL? Protecting sensitive or private data is serious business. Specially, in cases like credit card transactions. Hence, to encrypt the data being exchanged, we use TLS protocol.

GOALS OF TLS:•To securely encrypt data being exchanged•To guarantee the identity of one or both parties•To prevent data tampering•To prevent replay attacks

Page 5: TLS/SSL PROTOCOL

• A common misconception is is that encryption is the core goal and the others are non-essential.• Encryption of the data being transmitted requires that the other party to be capable of decrypting the data. This is possible because the client and the server will agree on an encryption key for a secure connection.• A Man-In-The-Middle (MitM) Attack might be possible.•This would allow the attacker to decrypt all data sent by the client.

SOLUTION:•Ability to verify the identity of the server that the client is communicating with.•Without that verification check, we have no way of telling the difference.

TRANSPORT LAYER VULNERABILITY:EXAMPLE:

Page 6: TLS/SSL PROTOCOL

•Data that goes through SSL protocols is encrypted with a key that will not reveal its secrets unless it detects the secure server •This interaction is called a "handshake”

CONVENTIONAL CRYPTOGRAPHY

•Symmetric cryptography•Requires the sender and receiver to share a key• As long as this key is kept secret, nobody other than the sender or recipient can read the message.

PUBLIC KEY CRYPTOGRAPHY

•Asymmetric cryptography, solves the key exchange problem by an algorithm which uses two keys• If one key is used to encrypt a message then the other must be used to decrypt it

WORKING PRINCIPLE:

Page 7: TLS/SSL PROTOCOL

SERVERCLIENT

CLIENT

CLIENT SERVER

SERVER

Page 8: TLS/SSL PROTOCOL

VERIFICATION CERTIFICATE SENT BY THE SERVER TO THE CLIENT:

Page 9: TLS/SSL PROTOCOL

ADVANTAGES:

• TLS is probably the most used security on the internet.• Do not need any Operating system support.• When messages are exchanged over the Internet, they are checked while transmitting from one computer to another. Hence, reliable.• TLS protocol stops a third party access unless, authenticated by authorized users• TLS is in use by most web browsers

Page 10: TLS/SSL PROTOCOL

APPLICATIONS OF TLS:

• LDAP (Lightweight Directory Access Protocol): software protocol for enabling anyone to locate organizations, individuals (public Internet or on a corporate intranet)

• SASL (Simple Authentication and Security Layer): framework for authentication and data security in Internet protocols

• BEEP (Blocks Extensible Exchange Protocol): authentication for connection and message-oriented peer-to-peer (P2P) protocols • SMTP (Simple Mail Transfer Protocol):• IMAP (Internet Message Access Protocol):• POP3 (Post Office Protocol 3):(Most recent version. E-mail is received and held for you by your Internet server)

is a TCP/IP protocol used in sending and receiving e-mail

Page 11: TLS/SSL PROTOCOL

The Secure Sockets Layer (SSL) Protocol

Page 12: TLS/SSL PROTOCOL

Overview

• What is SSL?• How does SSL work?• How to implement SSL?• Summary

Page 13: TLS/SSL PROTOCOL

What is SSL?

• A protocol developed by Netscape. • It is a whole new layer of protocol which

operates above the Internet TCP protocol and below high-level application protocols.

Page 14: TLS/SSL PROTOCOL
Page 15: TLS/SSL PROTOCOL

What Can SSL Do?

• SSL uses TCP/IP on behalf of the higher-level protocols.

• Allows an SSL-enabled server to authenticate itself to an SSL-enabled client;

• Allows the client to authenticate itself to the server;

• Allows both machines to establish an encrypted connection.

Page 16: TLS/SSL PROTOCOL

•SSL server authentication.•SSL client authentication. (optional)•An encrypted SSL connection or Confidentiality. This protects against electronic eavesdropper.•Integrity. This protects against hackers.•SSL includes two sub-protocols: the SSL Record Protocol and the SSL Handshake Protocol.•Record Protocol -- defines the format used to transmit data.•Handshake Protocol -- using the Record protocol to exchange messages b/t an SSL-enable server and an SSL-enable client.

Page 17: TLS/SSL PROTOCOL

Two Useful Terms

1.A certificate.• A certificate has the following content:

1. The certificate issuer’s name 2. The entity for whom the certificate is being issued . 3. The public key of the subject 4. Some time stamps

Page 18: TLS/SSL PROTOCOL

2. A digital signature -- A message digest derived from the original one, has following important properties:1. The digest is difficult to reverse2. It is hard to find a different message that computed to the same digest value.

Page 19: TLS/SSL PROTOCOL

SSL Architecture

Page 20: TLS/SSL PROTOCOL

SSL Working

• A client and a server create a secure connection

• The SSL protocol uses RSA public key cryptography for Internet Security.

• Public key encryption uses a pair of asymmetric keys for encryption and decryption.

Page 21: TLS/SSL PROTOCOL

Each pair of keys consists of a public key and a private key. The public key is made public by distributing it widely; the private key is always kept secret.Data encrypted with the public key can be decrypted only with the private key, and vice versa.

Page 22: TLS/SSL PROTOCOL

Advantages of SSL:

• Encrypts information• Authentication-improves customers trust• Guards against phishing attacks• Better search engine rankings

Page 23: TLS/SSL PROTOCOL

Summary

• SSL -- the Record Protocol and the Handshake Protocol.

• How to create a secure connection b/w a client and a server.

Page 24: TLS/SSL PROTOCOL

Thank you!