Information Security Unit3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) provide security to the data that is


transferred between web browser and server. SSL encrypt the link
between a web server and a browser which ensures that all data passed
between them remain private and free from attack.
It provides security at Transport layer.

Goals: i) Confidentiality
ii) Integrity
iii) Availability

Working of SSL:

SSL protocol is designed to interwork between application and transport


layer as shown in the following image −

Secure Socket Layer Protocols:


• SSL record protocol
• Handshake protocol
• Change-cipher spec protocol
• Alert protocol
• SSL Protocol Stack:

SSL Record Protocol:

SSL Record provide two services to SSL connection.


• Confidentiality
• Message Integerity
In SSL Record Protocol application data is divided into fragments. The
fragment is compressed and then encrypted MAC (Message
Authentication Code) generated by algorithms like SHA (Secure Hash
Protocol) and MD5 (Message Digest) is appended. After that encryption
of the data is done and in last SSL header is appended to the data.
Handshake Protocol:

Handshake Protocol is used to establish sessions. Handshake protocol


uses four phases to complete its cycle.
• Phase-1: In Phase-1 both Client and Server send hello-packets to
each other. In this IP session, cipher suite and protocol version are
exchanged for security purpose.

• Phase-2: Server send his certificate and Server-key-exchange.


Server end the phase-2 by sending Server-hello-end packet.

• Phase-3: In this phase Client reply to the server by sending his


certificate and Client-exchange-key.

• Phase-4: In Phase-4 Change-cipher suite occurred and after this


Handshake Protocol ends.
Change-cipher Protocol:
Change-cipher protocol consists of single message which is 1 byte in
length and can have only one value. This protocol purpose is to cause the
pending state to be copied into current state.

Alert Protocol:

This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contain 2 bytes.
Transport Layer Security (TLS)
• (TLS) is a protocol that provides communication security between
client/server applications that communicate with each other over the
Internet.

• It enables privacy, integrity, and protection for the data that's


transmitted between different nodes on the Internet. TLS is a
successor to the secure socket layer (SSL) protocol.

• TLS primarily enables secure Web browsing, applications access,


data transfer, and most Internet based communication.

• It prevents the transmitted/transported data from being


eavesdropped or tampered. TLS is used to secure Web browsers,
Web servers, VPNs, database servers and more.

TLS protocol consists of two different layers of sub-protocols:

• TLS Handshake Protocol: Enables the client and server to


authenticate each other and select an encryption algorithm before
sending the data

• TLS Record Protocol: It works on top of the standard TCP


protocol to ensure that the created connection is secure and
reliable. It also provides data encapsulation and data encryption
services.

There are several benefits of TLS:


• Encryption:

TLS/SSL can help to secure transmitted data using encryption.

• Interoperability:

TLS/SSL works with most web browsers, including Microsoft Internet


Explorer and on most operating systems and web servers.
• Algorithm flexibility:

TLS/SSL provides operations for authentication mechanism,


encryption algorithms and hashing algorithm that are used during the
secure session.

• Ease of Deployment:

Many applications TLS/SSL temporarily on a windows server 2003


operating systems.

• Ease of Use:

Because we implement TLS/SSL beneath the application layer, most


of its operations are completely invisible to client.

You might also like