SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
1
Ultimate Secure Sockets
Layer Guide
Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure
E-Commerce and E-Banking is possible. It has become the de facto standard for secure
and safe only transactions. When Netscape first developed SSL, the main aim or motive
behind it was to ensure that the client and host can communicate or transfer data and
information securely.
What SSL does in short would be, encrypt data at the sender’s end and decrypt data at
the receiver’s end. This encrypted data cannot be picked up or hijacked in between and
any tampering would not only be very difficult, it would easily be detected. Not only
that, SSL also provides for two-way authentication i.e. verification of the client’s and the
server’s identity.
THE VARIOUS FUNCTIONS OR FEATURES OF SSL CAN BE
DIVIDED INTO THREE MAIN CATEGORIES
1. SSL Encrypted Connection-: Provides for secure and safe transaction of encrypted data
between the client and the host.
2. SSL Client Authentication: is an optional feature, which allows for verification of the
client’s identity.
3. SSL server Authentication: provides for verification of the server’s Certificate Authority
(CA) which is nothing but a trusted safe host certificate given to the server by
companies like Verisign, Cybertrust, Thawte and more.
THE MAIN SSL PROTOCOL IS MADE UP OF TWO SMALLER
SUB-PROTOCOLS
1. The Secure Sockets Layer Record Protocol or The SSL
Record Protocol.
2. The Secure Sockets Layer Handshake Protocol or The SSL
Handshake Protocol.
2
The SSL Record Protocol looks after the transmission and the transmission format of the
encrypted data. Also it is this sub-protocol of SSL, which ensures data integrity in the
transfer process. On the other hand the SSL Handshake protocol basically helps to
determine the session key. To understand both these protocols better, read on.
"Hacking truth: A session key is a secret symmetrical key, which is used to encrypt data,
after a SSL connection has been established between the client and the host"
SECURE SOCKETS LAYER - THE WORKING
Now as soon as you enter a secure site, SSL comes into play. But how do you know
whether the connection is secure or not? Well, there are several things, which reveal the
fact that whether your connection is unsafe or safe.
The most common way to check whether your connection is secure or not is to look at
the status bar of your browser. If you see a closed padlock, then the connection is secure,
else if you see a open padlock, then the connection is not secure. Another area to watch
out for is the browser URL box. Now on an unsecured connection you will see only a
http:// before the other part of the URL of the site you are visiting. On the other hand, if
the connection is secure then you will see a https:// instead.
Another technique to ensure that you are on a secure connection is to have a look at the
Certificate Authority or CA or the server. How do I do that? Well, simply right click on the
page that you suspect to be on a unsecured connection, and select Properties. A
properties box pops up. Now look for the Connection field. A typical Connection field
would be as follows-:
SSL 3.0 DES WITH 40 BIT ENCRYPTION LOW,
RSA WITH 128 BIT EXCHANGE
This means that SSL 3.0 is running, DES
is the crypto system being used and it has
40-bit encryption level. And RSA is the
public key encryption algorithm being
used and in this case it used 128 bits.
Google
encryption
Anyway, let me start from what happens, once you are already on a secure connection.
Now as soon as the browser knows that a secure connection is present, The SSL
Handshake Protocol jumps into action. It sends the browser’s SSL version number,
Encryption settings and other crypto information to the remote host. Once the remote
server receives this, it in turn sends back to the client, its SSL number and cipher settings.
3
Also, if the server wants to, then this is the time when it verifies the client’s certificate.
This is done only if
An optional SSL feature, The SSL Client Authentication feature is present.
"NOTE : Client Authentication can also be done at a later stage. It basically varies from
Server to server, as to when this authentication is done, or whether it is done at all"
Then, the client verifies the server’s Certificate Authority. This is done to ensure that the
public key received by the client is that of the correct authentic server. If the server does
not have a CA certificate or if the certificate has expired, then a dialog box pops up
informing the user. [Warning the user]
Once the server’s identity has been authenticated, then the client creates a ‘Premaster
Secret’ which is unique for each new SSL session. This ‘Premaster Secret’ is then
encrypted using the server’s Public Key and this encrypted Premaster secret is then sent
to the server. The important thing to note here is that the Server’s Public Key is extracted
from the server’s Digital Certificate, which is nothing but a digitally signed certificate
containing the owner’s public key.
Now, when the server receives the encrypted premaster secret, it verifies the client’s
identity. [This is optional and varies from server to server] Anyway, Once the client’s
identity has been authenticated, the server uses its private key to decrypt the premaster
secret, to obtain the master secret. This master secret is used to determine the session
key.
"Note: The transfer of the premaster and master is also done for compatibility reasons"
Now, everything till now is handled by The SSL Handshake Protocol. Once all this is done,
The SSL Record Protocol comes into the picture. Now, once the server has determined,
the symmetrical session key, it sends it to the client and further communication is done
using this session key. As the key is symmetrical, it can be used for both decrypting and
encrypting purposes. The SSL Record Protocol handles all data transfer
A typical SSL transaction involves various encryption algorithms like RSA and DSS. Other
popular ones are DES and RC4. Data integrity is ensured by using ciphers like MD5, SHA
etc, which are called Message Authentication Codes or MAC. A MAC is nothing but a
checksum authentication thingy which converts the data into digits. The checksum value
at the receiver’s end is compared to that at the sender’s end. If any tampering If any
tampering is done or in other words, if the checksums do not match, then that particular
session is considered void and the entire above process if repeated i.e. data is
transmitted again.
4
However, SSL is not as secure as it seems to be. The problem lies in the fact that the
encryption algorithms used along with SLL are quite lame and can easily be cracked. All
versions below 3.0 have been cracked, however SSL 3.0 with 128 bits would take a very
very long time to crack, if it could be cracked. So it is quite same to a certain extend.
"So how do you ensure that your SSL transaction is secure? Well, the best thing to do is
to use 128-Bit encryption instead of 40-Bit. The former has 3 * 1026 more keys than the
latter. Also install the latest version of your browsers, to ensure that you have the
latest encryption standards and security patches"

Contenu connexe

Similaire à SSL encryption guide: How SSL secures data transmission

Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL CertificateCheapSSLUSA
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentationAmjad Bhutto
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxtodd401
 
Improve your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfImprove your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfDigital Marketing
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
White paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSLWhite paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSLGlobalSign
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptSonukumarRawat
 

Similaire à SSL encryption guide: How SSL secures data transmission (20)

Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
 
Ssl
SslSsl
Ssl
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
ssl
sslssl
ssl
 
Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentation
 
The last picks
The last picksThe last picks
The last picks
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
fengmei.ppt
fengmei.pptfengmei.ppt
fengmei.ppt
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
fengmei.ppt
fengmei.pptfengmei.ppt
fengmei.ppt
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
SSL.ppt
SSL.pptSSL.ppt
SSL.ppt
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
 
What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
 
SSL-image
SSL-imageSSL-image
SSL-image
 
Improve your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfImprove your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdf
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
White paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSLWhite paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSL
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 

Dernier

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 

Dernier (11)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 

SSL encryption guide: How SSL secures data transmission

  • 1. 1 Ultimate Secure Sockets Layer Guide Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure E-Commerce and E-Banking is possible. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL, the main aim or motive behind it was to ensure that the client and host can communicate or transfer data and information securely. What SSL does in short would be, encrypt data at the sender’s end and decrypt data at the receiver’s end. This encrypted data cannot be picked up or hijacked in between and any tampering would not only be very difficult, it would easily be detected. Not only that, SSL also provides for two-way authentication i.e. verification of the client’s and the server’s identity. THE VARIOUS FUNCTIONS OR FEATURES OF SSL CAN BE DIVIDED INTO THREE MAIN CATEGORIES 1. SSL Encrypted Connection-: Provides for secure and safe transaction of encrypted data between the client and the host. 2. SSL Client Authentication: is an optional feature, which allows for verification of the client’s identity. 3. SSL server Authentication: provides for verification of the server’s Certificate Authority (CA) which is nothing but a trusted safe host certificate given to the server by companies like Verisign, Cybertrust, Thawte and more. THE MAIN SSL PROTOCOL IS MADE UP OF TWO SMALLER SUB-PROTOCOLS 1. The Secure Sockets Layer Record Protocol or The SSL Record Protocol. 2. The Secure Sockets Layer Handshake Protocol or The SSL Handshake Protocol.
  • 2. 2 The SSL Record Protocol looks after the transmission and the transmission format of the encrypted data. Also it is this sub-protocol of SSL, which ensures data integrity in the transfer process. On the other hand the SSL Handshake protocol basically helps to determine the session key. To understand both these protocols better, read on. "Hacking truth: A session key is a secret symmetrical key, which is used to encrypt data, after a SSL connection has been established between the client and the host" SECURE SOCKETS LAYER - THE WORKING Now as soon as you enter a secure site, SSL comes into play. But how do you know whether the connection is secure or not? Well, there are several things, which reveal the fact that whether your connection is unsafe or safe. The most common way to check whether your connection is secure or not is to look at the status bar of your browser. If you see a closed padlock, then the connection is secure, else if you see a open padlock, then the connection is not secure. Another area to watch out for is the browser URL box. Now on an unsecured connection you will see only a http:// before the other part of the URL of the site you are visiting. On the other hand, if the connection is secure then you will see a https:// instead. Another technique to ensure that you are on a secure connection is to have a look at the Certificate Authority or CA or the server. How do I do that? Well, simply right click on the page that you suspect to be on a unsecured connection, and select Properties. A properties box pops up. Now look for the Connection field. A typical Connection field would be as follows-: SSL 3.0 DES WITH 40 BIT ENCRYPTION LOW, RSA WITH 128 BIT EXCHANGE This means that SSL 3.0 is running, DES is the crypto system being used and it has 40-bit encryption level. And RSA is the public key encryption algorithm being used and in this case it used 128 bits. Google encryption Anyway, let me start from what happens, once you are already on a secure connection. Now as soon as the browser knows that a secure connection is present, The SSL Handshake Protocol jumps into action. It sends the browser’s SSL version number, Encryption settings and other crypto information to the remote host. Once the remote server receives this, it in turn sends back to the client, its SSL number and cipher settings.
  • 3. 3 Also, if the server wants to, then this is the time when it verifies the client’s certificate. This is done only if An optional SSL feature, The SSL Client Authentication feature is present. "NOTE : Client Authentication can also be done at a later stage. It basically varies from Server to server, as to when this authentication is done, or whether it is done at all" Then, the client verifies the server’s Certificate Authority. This is done to ensure that the public key received by the client is that of the correct authentic server. If the server does not have a CA certificate or if the certificate has expired, then a dialog box pops up informing the user. [Warning the user] Once the server’s identity has been authenticated, then the client creates a ‘Premaster Secret’ which is unique for each new SSL session. This ‘Premaster Secret’ is then encrypted using the server’s Public Key and this encrypted Premaster secret is then sent to the server. The important thing to note here is that the Server’s Public Key is extracted from the server’s Digital Certificate, which is nothing but a digitally signed certificate containing the owner’s public key. Now, when the server receives the encrypted premaster secret, it verifies the client’s identity. [This is optional and varies from server to server] Anyway, Once the client’s identity has been authenticated, the server uses its private key to decrypt the premaster secret, to obtain the master secret. This master secret is used to determine the session key. "Note: The transfer of the premaster and master is also done for compatibility reasons" Now, everything till now is handled by The SSL Handshake Protocol. Once all this is done, The SSL Record Protocol comes into the picture. Now, once the server has determined, the symmetrical session key, it sends it to the client and further communication is done using this session key. As the key is symmetrical, it can be used for both decrypting and encrypting purposes. The SSL Record Protocol handles all data transfer A typical SSL transaction involves various encryption algorithms like RSA and DSS. Other popular ones are DES and RC4. Data integrity is ensured by using ciphers like MD5, SHA etc, which are called Message Authentication Codes or MAC. A MAC is nothing but a checksum authentication thingy which converts the data into digits. The checksum value at the receiver’s end is compared to that at the sender’s end. If any tampering If any tampering is done or in other words, if the checksums do not match, then that particular session is considered void and the entire above process if repeated i.e. data is transmitted again.
  • 4. 4 However, SSL is not as secure as it seems to be. The problem lies in the fact that the encryption algorithms used along with SLL are quite lame and can easily be cracked. All versions below 3.0 have been cracked, however SSL 3.0 with 128 bits would take a very very long time to crack, if it could be cracked. So it is quite same to a certain extend. "So how do you ensure that your SSL transaction is secure? Well, the best thing to do is to use 128-Bit encryption instead of 40-Bit. The former has 3 * 1026 more keys than the latter. Also install the latest version of your browsers, to ensure that you have the latest encryption standards and security patches"