際際滷

際際滷Share a Scribd company logo
SSL
Demystified
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
Client
Public Key
Client
Private Key
Server
Public Key
Server
Private Key
PREVIEW
1. Client has
public key and
private key in
browser
1. Server has its
public key and
private key
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
Generate Random Number
Rc
Rc
client_hello(crypto info, )Rc
2. Client generates a
random number and sends
to server with crypto
info(SSLv #, cipher suites
supported)
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
Generate Random Number
Rs
RcRc
Rs
Demand Client Certificate
Server Certificate (including )
 
server_hello(crypto info, )Rs
3. Server responds with
chosen cipher suite,
session ID, another
random string and its
digital certificate
4. Requesting client
certificate that
includes list of types of
certs supported and
names of acceptable
CAs
C
L
I
E
N
T
S
E
R
V
E
R
   
Check server
certificate
Rc Rc
Rs
   
Rs
Client Certificate (including )
 
Hash of all previous messages signed with
 
 
5. Client
verifies servers
certificate
6. Client sends a hash of
all messages signed with
  +
clients digital certificate
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
DH-KEY EXCHANGE
random random
abc xyz
random abc
random
xyz
random xyz
random
abc
abc xyz
random
abcxyz
Shared over open channel
Shared over open channel
Mathematically generates common session key
Diffie-Hellman key agreement is not based on encryption and decryption, but instead relies on mathematical functions that enable two parties to
generate a shared secret key for exchanging information confidentially online
Client generated
private key
Server generated
private key
MK
7. Key
Exchange
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
RSA-KEY EXCHANGE
random
Shared over open channel
RSA key exchange implements exchange of secret keys securely online by encrypting the secret key with the intended recipient's public key
 
drnoam drnoam
 
random
MK
7. Key
Exchange
C
L
I
E
N
T
S
E
R
V
E
R
   
Change to encrypted connection using as KEY
MK
End SSL Handshake
Rc Rc
Rs
   
Rs
MK MK
8. Client sends
finished message
encrypted with
secret key
C
L
I
E
N
T
S
E
R
V
E
R
   
Change to encrypted connection using as KEY
MK
End SSL Handshake
Rc Rc
Rs
   
Rs
9. Server sends
finished message
encrypted with
secret key
MK MK
SSL on
Confidentiality
and
Integrity
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
CONFIDENTIALITY
During the SSL handshake, the SSL client and SSL server agree on encryption algorithm and a shared secret key to be used for one session
only.
All messages transmitted between the SSL client and SSL server are encrypted using that algorithm and key, ensuring that the message
remains private even if it is intercepted
Because SSL uses asymmetric encryption when transporting the shared secret key, there is no key distribution problem with SSL
SSL provides data integrity check by calculating the message digest.
A message can be digitally signed by a message exit at the sending end of a channel. The digital signature can then be checked by a
message exit at the receiving end of a channel to detect whether the message has been deliberately modified.
Use of SSL or TLS does ensure data integrity, provided that the CipherSpec in your channel definition uses a hash algorithm.
INTEGRITY
SSL on
Authentication
and
Verification
C
L
I
E
N
T
S
E
R
V
E
R
 
   
 
For SERVER authentication, the client uses the servers PUBLIC KEY to ENCRYPT the data that is used to compute the secret key. The server
can generate the secret key only if it can decrypt that data with the correct PRIVATE KEY.
For CLIENT authentication, the server uses the PUBLIC KEY in the client certificate to VERIFY the data the client sends during of the
handshake. The exchange of finished messages that are encrypted with the secret key confirms that authentication is complete.
If any of the authentication steps fail, the handshake fails and the session terminates.
AUTHENTICATION
 The digital signature is checked
 The certificate chain is checked
 The expiry and activation dates and the validity period are checked
 The revocation status of the certificate is checked
CERTIFICATE VERIFICATION
Reference -
Wikipedia
The End
Ad

Recommended

The last picks
The last picks
Nafiur Rahman Tuhin
Introduction to SSL/TLS
Introduction to SSL/TLS
keithrozario
SSL Secure Socket Layer
SSL Secure Socket Layer
omkar bhagat
How ssl works
How ssl works
Saptarshi Basu
SSL intro
SSL intro
Three Lee
SSL
SSL
Badrul Alam bulon
Sniffing SSL Traffic
Sniffing SSL Traffic
dkaya
SSL
SSL
theekuchi
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
Ssl in a nutshell
Ssl in a nutshell
Frank Kelly
secure socket layer
secure socket layer
Amar Shah
SSL/TLS 101
SSL/TLS 101
Chul-Woong Yang
SSL
SSL
Duy Do Phan
SSL TLS Protocol
SSL TLS Protocol
Devang Badrakiya
SSl/TLS Analysis
SSl/TLS Analysis
Duduman Bogdan Vlad
SSL-image
SSL-image
Rajat Toshniwal
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
Sandeep Gupta
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
Vishal Kumar
SSL Layer
SSL Layer
Trinh Phuc Tho
Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
Cryptography by Afroz haider mir
Cryptography by Afroz haider mir
AFROZ MIR
SSL overview
SSL overview
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
TLS: Past, Present, Future
TLS: Past, Present, Future
vpnmentor
ssl
ssl
sjyuva
Secure Socket Layer
Secure Socket Layer
Abhishek Gupta
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
SSL/TLS
SSL/TLS
pavansmiles
SSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla

More Related Content

What's hot (20)

Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
Ssl in a nutshell
Ssl in a nutshell
Frank Kelly
secure socket layer
secure socket layer
Amar Shah
SSL/TLS 101
SSL/TLS 101
Chul-Woong Yang
SSL
SSL
Duy Do Phan
SSL TLS Protocol
SSL TLS Protocol
Devang Badrakiya
SSl/TLS Analysis
SSl/TLS Analysis
Duduman Bogdan Vlad
SSL-image
SSL-image
Rajat Toshniwal
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
Sandeep Gupta
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
Vishal Kumar
SSL Layer
SSL Layer
Trinh Phuc Tho
Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
Cryptography by Afroz haider mir
Cryptography by Afroz haider mir
AFROZ MIR
SSL overview
SSL overview
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
TLS: Past, Present, Future
TLS: Past, Present, Future
vpnmentor
ssl
ssl
sjyuva
Secure Socket Layer
Secure Socket Layer
Abhishek Gupta
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
SSL/TLS
SSL/TLS
pavansmiles
SSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar

Similar to SSL Demystified (20)

presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
Introduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
SIP over TLS
SIP over TLS
Hossein Yavari
cryptography and network security thid.ppt
cryptography and network security thid.ppt
ubaidullah75790
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
Web Security
Web Security
Ram Dutt Shukla
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
jayewi2029
SSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
SSL And TLS
SSL And TLS
Ghanshyam Patel
Ssl
Ssl
Anandraj Kulkarni
Wireshark lab ssl v7 solution
Wireshark lab ssl v7 solution
United International University
How does TLS work?
How does TLS work?
Hyeonsu Lee
Certificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
Indianapolis mule soft_meetup_30_jan_2021 (1)
Indianapolis mule soft_meetup_30_jan_2021 (1)
ikram_ahamed
Secure payment systems
Secure payment systems
Abdulaziz Mohd
Webinar SSL English
Webinar SSL English
皆皆晦247速
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
Introduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
cryptography and network security thid.ppt
cryptography and network security thid.ppt
ubaidullah75790
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
jayewi2029
SSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
How does TLS work?
How does TLS work?
Hyeonsu Lee
Certificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
Indianapolis mule soft_meetup_30_jan_2021 (1)
Indianapolis mule soft_meetup_30_jan_2021 (1)
ikram_ahamed
Secure payment systems
Secure payment systems
Abdulaziz Mohd
Ad

Recently uploaded (20)

MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
惠惘惘 惺 悋惠忰 悋惆悋 惠惆 悋悋悄 忰 悴悋忰.pdf
惠惘惘 惺 悋惠忰 悋惆悋 惠惆 悋悋悄 忰 悴悋忰.pdf
忰惆 惶惶 惠惠悸
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
hosseinihamid192023
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
Fran巽ois Garillot
How to Un-Obsolete Your Legacy Keypad Design
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
惠惘惘 惺 悋惠忰 悋惆悋 惠惆 悋悋悄 忰 悴悋忰.pdf
惠惘惘 惺 悋惠忰 悋惆悋 惠惆 悋悋悄 忰 悴悋忰.pdf
忰惆 惶惶 惠惠悸
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
hosseinihamid192023
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
Fran巽ois Garillot
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
Ad

SSL Demystified

  • 2. C L I E N T S E R V E R Client Public Key Client Private Key Server Public Key Server Private Key PREVIEW 1. Client has public key and private key in browser 1. Server has its public key and private key
  • 3. C L I E N T S E R V E R Generate Random Number Rc Rc client_hello(crypto info, )Rc 2. Client generates a random number and sends to server with crypto info(SSLv #, cipher suites supported)
  • 4. C L I E N T S E R V E R Generate Random Number Rs RcRc Rs Demand Client Certificate Server Certificate (including ) server_hello(crypto info, )Rs 3. Server responds with chosen cipher suite, session ID, another random string and its digital certificate 4. Requesting client certificate that includes list of types of certs supported and names of acceptable CAs
  • 5. C L I E N T S E R V E R Check server certificate Rc Rc Rs Rs Client Certificate (including ) Hash of all previous messages signed with 5. Client verifies servers certificate 6. Client sends a hash of all messages signed with + clients digital certificate
  • 6. C L I E N T S E R V E R DH-KEY EXCHANGE random random abc xyz random abc random xyz random xyz random abc abc xyz random abcxyz Shared over open channel Shared over open channel Mathematically generates common session key Diffie-Hellman key agreement is not based on encryption and decryption, but instead relies on mathematical functions that enable two parties to generate a shared secret key for exchanging information confidentially online Client generated private key Server generated private key MK 7. Key Exchange
  • 7. C L I E N T S E R V E R RSA-KEY EXCHANGE random Shared over open channel RSA key exchange implements exchange of secret keys securely online by encrypting the secret key with the intended recipient's public key drnoam drnoam random MK 7. Key Exchange
  • 8. C L I E N T S E R V E R Change to encrypted connection using as KEY MK End SSL Handshake Rc Rc Rs Rs MK MK 8. Client sends finished message encrypted with secret key
  • 9. C L I E N T S E R V E R Change to encrypted connection using as KEY MK End SSL Handshake Rc Rc Rs Rs 9. Server sends finished message encrypted with secret key MK MK
  • 11. C L I E N T S E R V E R CONFIDENTIALITY During the SSL handshake, the SSL client and SSL server agree on encryption algorithm and a shared secret key to be used for one session only. All messages transmitted between the SSL client and SSL server are encrypted using that algorithm and key, ensuring that the message remains private even if it is intercepted Because SSL uses asymmetric encryption when transporting the shared secret key, there is no key distribution problem with SSL SSL provides data integrity check by calculating the message digest. A message can be digitally signed by a message exit at the sending end of a channel. The digital signature can then be checked by a message exit at the receiving end of a channel to detect whether the message has been deliberately modified. Use of SSL or TLS does ensure data integrity, provided that the CipherSpec in your channel definition uses a hash algorithm. INTEGRITY
  • 13. C L I E N T S E R V E R For SERVER authentication, the client uses the servers PUBLIC KEY to ENCRYPT the data that is used to compute the secret key. The server can generate the secret key only if it can decrypt that data with the correct PRIVATE KEY. For CLIENT authentication, the server uses the PUBLIC KEY in the client certificate to VERIFY the data the client sends during of the handshake. The exchange of finished messages that are encrypted with the secret key confirms that authentication is complete. If any of the authentication steps fail, the handshake fails and the session terminates. AUTHENTICATION The digital signature is checked The certificate chain is checked The expiry and activation dates and the validity period are checked The revocation status of the certificate is checked CERTIFICATE VERIFICATION