Secure Socket Layer
-
Upload
dwitigajab -
Category
Education
-
view
199 -
download
0
Transcript of Secure Socket Layer
205/26/12
Contents: Cryptography and Secure Socket Layer
(SSL)
Establishment of Secured connection for “Encryption”
Briefing on Asymmetric Encryption algorithms
305/26/12
Cryptography:
Security and Integrity
Encryption helps in achieving this.
SSL is one such type of protocols. Its two main functions are:
Encryption
Identification
605/26/12
Few terms: Certificate:
- It is used to authenticate the website.
- Issued by Certificate Authority (CA).
- Mainly contains: Public Key Digital Signature
Hashing:
- It is a process that compresses text to a single number.
- Used in a certificate and in SSL handshaking.
705/26/12
Data Transfer:
Asymmetric Data Transfer- Used in handshaking- Two Keys are involved:
Public Key: It is used to encrypt. Private Key: It is used to decrypt.
Symmetric Data Transfer
Used in application data transfer. Same key is used in encryption & decryption.
905/26/12
Encryption Algorithms:
RC4
AES
HMAC- SHATriple DESDiffie Hellman
HAC- MD5DESRSA
HashCipherKey
A B
RC4
AES
HMAC- SHATriple DESDiffie Hellman
HAC- MD5DESRSA
HashCipherKey
Computers agree how to encrypt !
1505/26/12
Asymmetric Key Cryptography: Diffi Hellman algorithm Rivest, Shamir and Adleman (RSA) algorithm
1605/26/12
Symmetric key Cryptography:
Used for encryption of data.
Substitution/Transposition/Simple round ciphers.
Modern round ciphers: DES, Triple DES, AES
1705/26/12
Future Scope:
Development of RSA algorithm for better security.
References:
Data communication and Networking, 4E, by Behrouz A. Forouzan
Computer Networks by Ross & Kurose Network Security IOS by CISCO. http://en.wikipedia.org/wiki/Secure_Sockets_Layer http://httpd.apache.org/docs/2.0/ssl/ssl_intro.html