際際滷

際際滷Share a Scribd company logo
 Secure Socket Layer Project Presentation by: Dwiti Gajab Mihir Trivedi   Aman Chaurasia
Contents: Cryptography and Secure Socket Layer (SSL) Establishment of Secured connection for Encryption Briefing on Asymmetric Encryption algorithms
Cryptography: Security and Integrity Encryption helps in achieving this. SSL is one such type of protocols. Its two main functions are: Encryption Identification
Why SSL exists?
SSL Architecture:
Few terms: Certificate:  - It is used to authenticate the website.  - Issued by Certificate Authority (CA). - Mainly contains: Public Key Digital Signature   Hashing: - It is a process that compresses text to a single number. - Used in a certificate and in SSL handshaking.
Data Transfer: Asymmetric Data Transfer - Used in handshaking - Two Keys are involved: Public Key: It is used to encrypt. Private Key: It is used to decrypt. Symmetric Data Transfer Used in application data transfer. Same key is used in encryption & decryption.
SSL Handshaking:
Encryption Algorithms: A B Computers agree how to encrypt ! 油 RC4 油 油 AES 油 HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA 油 油 油 Hash Cipher Key 油 RC4 油 油 AES 油 HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA 油 油 油 Hash Cipher Key
油
油
油
油
油
Asymmetric Key Cryptography: Diffi Hellman algorithm Rivest, Shamir and Adleman (RSA) algorithm
Symmetric key Cryptography: Used for encryption of  data. Substitution/Transposition/Simple round ciphers. Modern round ciphers: DES, Triple DES, AES
Future Scope: Development of RSA algorithm for better security. References: Data communication and Networking, 4E, by Behrouz A. Forouzan Computer Networks by Ross & Kurose Network Security IOS by CISCO. http:// en.wikipedia.org/wiki/Secure_Sockets_Layer http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html
Any Questions??? Thank 額看顎

More Related Content

What's hot (20)

2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
Email security
Email securityEmail security
Email security
Ahmed EL-KOSAIRY
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
Transport layer security
Transport layer securityTransport layer security
Transport layer security
Hrudya Balachandran
Cryptography
CryptographyCryptography
Cryptography
Kalyani Government Engineering College
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
Dr Anjan Krishnamurthy
Email security
Email securityEmail security
Email security
Indrajit Sreemany
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Chhatra Thapa
Email security
Email securityEmail security
Email security
Baliram Yadav
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Chhatra Thapa

Similar to Secure Socket Layer (SSL) (20)

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
dwitigajab
Secure socket layer working
Secure socket layer workingSecure socket layer working
Secure socket layer working
Sanjeevsharma620
SSLtalk
SSLtalkSSLtalk
SSLtalk
Matthew Aylard
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
Hussain Almohammadi
Ciphers
CiphersCiphers
Ciphers
Ahtesham Husain Shaikh
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
Cryptography
CryptographyCryptography
Cryptography
okolo chukwudumebi prince
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptxCRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
SVENISHA
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
Mark Morris
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
Cryptography summary
Cryptography summaryCryptography summary
Cryptography summary
Ni
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
Web cryptography javascript
Web cryptography javascriptWeb cryptography javascript
Web cryptography javascript
Jose Manuel Ortega Candel
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
Joao Galdino Mello de Souza
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
dwitigajab
Secure socket layer working
Secure socket layer workingSecure socket layer working
Secure socket layer working
Sanjeevsharma620
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
Hussain Almohammadi
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptxCRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
SVENISHA
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
Mark Morris
Cryptography summary
Cryptography summaryCryptography summary
Cryptography summary
Ni
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088

Secure Socket Layer (SSL)

  • 1. Secure Socket Layer Project Presentation by: Dwiti Gajab Mihir Trivedi Aman Chaurasia
  • 2. Contents: Cryptography and Secure Socket Layer (SSL) Establishment of Secured connection for Encryption Briefing on Asymmetric Encryption algorithms
  • 3. Cryptography: Security and Integrity Encryption helps in achieving this. SSL is one such type of protocols. Its two main functions are: Encryption Identification
  • 6. Few terms: Certificate: - It is used to authenticate the website. - Issued by Certificate Authority (CA). - Mainly contains: Public Key Digital Signature Hashing: - It is a process that compresses text to a single number. - Used in a certificate and in SSL handshaking.
  • 7. Data Transfer: Asymmetric Data Transfer - Used in handshaking - Two Keys are involved: Public Key: It is used to encrypt. Private Key: It is used to decrypt. Symmetric Data Transfer Used in application data transfer. Same key is used in encryption & decryption.
  • 9. Encryption Algorithms: A B Computers agree how to encrypt ! 油 RC4 油 油 AES 油 HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA 油 油 油 Hash Cipher Key 油 RC4 油 油 AES 油 HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA 油 油 油 Hash Cipher Key
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Asymmetric Key Cryptography: Diffi Hellman algorithm Rivest, Shamir and Adleman (RSA) algorithm
  • 16. Symmetric key Cryptography: Used for encryption of data. Substitution/Transposition/Simple round ciphers. Modern round ciphers: DES, Triple DES, AES
  • 17. Future Scope: Development of RSA algorithm for better security. References: Data communication and Networking, 4E, by Behrouz A. Forouzan Computer Networks by Ross & Kurose Network Security IOS by CISCO. http:// en.wikipedia.org/wiki/Secure_Sockets_Layer http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html