SlideShare una empresa de Scribd logo
1 de 18
“ Secure Socket Layer” ,[object Object],[object Object],[object Object],[object Object]
Contents: ,[object Object],[object Object],[object Object],[object Object]
Cryptography: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why SSL exists?
SSL Architecture:
Few terms: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Transfer: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSL Handshaking:
Encryption Algorithms: A B Computers agree how to encrypt !   RC4     AES   HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA       Hash Cipher Key   RC4     AES   HMAC- SHA Triple DES Diffie Hellman HAC- MD5 DES RSA       Hash Cipher Key
 
 
 
 
 
Asymmetric Key Cryptography: ,[object Object],[object Object]
Symmetric key Cryptography: ,[object Object],[object Object],[object Object]
Future Scope: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Chhatra Thapa
 

La actualidad más candente (20)

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
SSL
SSLSSL
SSL
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Basics of ssl
Basics of sslBasics of ssl
Basics of ssl
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Kerberos
KerberosKerberos
Kerberos
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
SSL intro
SSL introSSL intro
SSL intro
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Key management
Key managementKey management
Key management
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 

Similar a Secure Socket Layer (SSL)

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
dwitigajab
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 

Similar a Secure Socket Layer (SSL) (20)

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Secure socket layer working
Secure socket layer workingSecure socket layer working
Secure socket layer working
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 
Ciphers
CiphersCiphers
Ciphers
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Cryptography summary
Cryptography summaryCryptography summary
Cryptography summary
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Web cryptography javascript
Web cryptography javascriptWeb cryptography javascript
Web cryptography javascript
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 

Secure Socket Layer (SSL)