Cyber
Cyber
Bachelor of Technology
Computer Science and Engineering
Submitted By
March 2025
Techno Main
EM-4/1, Sector-V, Salt Lake
Kolkata- 700091
West Bengal
India
TABLE OF CONTENTS
TMSL/CSE/CA2/2024-25/Semester-8 2
7 (a) Steps Involved in SSL Protocol
The Secure Sockets Layer (SSL) Protocol ensures encrypted and secure communication between a
client (such as a web browser) and a server. The process follows these main steps:
1. Handshake Phase:
o The client sends a request to the server to establish a secure connection, along with
supported encryption algorithms and SSL version.
o The server responds by selecting the encryption algorithm and sending its digital
certificate (containing the public key) to the client.
2. Authentication & Key Exchange:
o The client verifies the server’s certificate against a trusted Certificate Authority (CA).
o If the certificate is valid, the client generates a session key and encrypts it using the
server’s public key. This encrypted key is then sent to the server.
3. Session Key Generation:
o The server decrypts the received session key using its private key.
o Both client and server now have a shared symmetric session key for encrypting
further communication.
4. Secure Data Transmission:
o Using the session key, both parties encrypt and decrypt messages, ensuring
confidentiality and data integrity.
5. Session Termination:
o Once the communication is complete, either party can initiate a session termination
request.
o The session key is discarded, and the connection is securely closed.
TMSL/CSE/CA2/2024-25/Semester-8 3
4. Secure Transactions:
o Commonly used in online banking, e-commerce, and sensitive data transfers to ensure
customer trust.
5. Improved SEO Ranking:
o Websites using SSL (HTTPS) receive better rankings in search engines like Google.
TMSL/CSE/CA2/2024-25/Semester-8 4
Conclusion:
SSL is an older protocol that has been replaced by TLS due to security vulnerabilities.
TLS provides better encryption, faster performance, and stronger authentication methods.
Today, TLS 1.2 and TLS 1.3 are the preferred protocols for securing online
communications.
Reference :
Here are two books that cover SSL, TLS, and network security in detail:
These books are great resources for understanding both the theoretical and practical aspects of
SSL/TLS security.
TMSL/CSE/CA2/2024-25/Semester-8 5