1 / 27

SSL Handshake Explained | What Is SSL Handshake? | SSL Handshake Protocol | Cryp

In this presentation on SSL Handshake Explained, we understand what Is SSL handshake is. We dive into the security benefits of the SSL Handshake protocol in Cryptography. We learn about the entire SSL protocol, its sub-protocols, the protection it provides against malicious actors, and detailed steps that explain the handshake process from initiation until completion. <br>The topics covered in this presentation are:<br><br>1. Why SSL Is necessary?<br>2. What Is the SSL Protocol?<br>3. Sub-protocols in SSL<br>4. SSL <br>5. Steps In SSL Handshake<br>6. Future of SSL

Simplilearn
Télécharger la présentation

SSL Handshake Explained | What Is SSL Handshake? | SSL Handshake Protocol | Cryp

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Source : Statista

  2. Global Cybercrime Damage by 2021 $16.4 Billion per day $684.9 Million per hour $11 Million per minute Source : Cybercrime Ventures

  3. Click here to watch the video

  4. Global Cybercrime Damage by 2021 To preserve our data online from hackers, SSL handshake was introduced. $16.4 Billion per day $684.9 Million per hour $11 Million per minute Source : Cybercrime Ventures

  5. Agenda for The Day What Is the SSL Protocol? SSL Protections Sub-Protocols In SSL Steps in SSL Handshake Future of SSL

  6. What Is the SSL Protocol?

  7. What Is the SSL Protocol? • Secure Socket Layer developed by Netscape in 1995 • Security protocol to provide security and privacy • Used to encrypt information between a client and server Encrypted Data Web Browser Web Server

  8. What Is the SSL Protocol? SSL Layer works between the Application Layer and Transport Layer when encrypting the information between client and server Application Layer SSL Layer Transport Layer

  9. SSL Stack SSL Alert HTTP SSL Handshake SSL Change Cipher Spec Application Layer SSL Record Layer Protocol Transmission Control Protocol Transport Layer Internet Protocol Internet Layer

  10. SSL Protections

  11. SSL Protections

  12. SSL Protections Authenticity via securing the right client and sever connection

  13. SSL Protections Ensuring Integrity of data by encryption of data flow

  14. SSL Protections Preserving Confidentiality of information being transferred

  15. Sub-Protocols In SSL

  16. Sub-Protocols in SSL

  17. Steps In SSL Handshake

  18. Steps In SSL Handshake – Phase 1 • Client & Server get acquainted with a hello signal each. • Client sends SSL version, cipher suite, session ID etc. • Server returns a common encryption algorithm chosen from the cipher suite and compression algorithm Client Server Client Hello Server Hello

  19. Steps In SSL Handshake – Phase 2 • Server sends its own authentication certificate and requests for client authentication • Server also send its own public encryption key • The phase with a ‘server hello done’ message Client Server Sends server certificate and it’s public key Requests client certificate Server Hello Done

  20. Steps In SSL Handshake – Phase 3 • Client sends its own authentication certificate after verifying server with respective certificate authorities (CAs) • Client also send a secret private key encrypted using the server’s previously received public key Client Server Client Certificate Session Key encrypted using server’s key

  21. Steps In SSL Handshake – Phase 4 • Client sends the status of the cipher functions along with a ‘finished’ message to end the handshake from its side • Server also sends status of the cipher algorithms and ends with a ‘finished’ signal • The data is encrypted with the symmetric key client sent in Ph 3 Client Server Change cipher spec Finished Change cipher spec Finished

  22. Client Server Client Hello Server Hello Certificate Server Hello Done Client Key Exchange Change Cipher Spec Client Finished Change Cipher Spec Server Finished Handshake Finished

  23. Future of SSL

  24. Future of SSL • SSL v2.0 and v3.0 have been deprecated by IETF in 2011 and 2015, respectively. • Transport Layer Security(TLS) is the successor to SSL protocol. • TLS v1.2 and v1.3 are now the global standards for securing internet traffic from client to server.

More Related