0% found this document useful (0 votes)
20 views5 pages

Cyber

The document provides an overview of SSL and TLS protocols, detailing the steps involved in SSL, its advantages, and the differences between SSL and TLS. It highlights SSL's vulnerabilities and the transition to TLS, which offers improved security and performance. The conclusion emphasizes that TLS 1.2 and 1.3 are the preferred protocols for secure online communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views5 pages

Cyber

The document provides an overview of SSL and TLS protocols, detailing the steps involved in SSL, its advantages, and the differences between SSL and TLS. It highlights SSL's vulnerabilities and the transition to TLS, which offers improved security and performance. The conclusion emphasizes that TLS 1.2 and 1.3 are the preferred protocols for secure online communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

#SSL vs TLS Overview

Bachelor of Technology
Computer Science and Engineering

Submitted By

SOUMIK MAITY (13000121013)

March 2025

Techno Main
EM-4/1, Sector-V, Salt Lake
Kolkata- 700091
West Bengal
India
TABLE OF CONTENTS

1. Steps Involved in SSL Protocol -------------------------------------------- 03


2. Advantages of SSL Protocol ------------------------------------------------- 03-04
3. Difference Between SSL and TLS ------------------------------------------ 04
4. Conclusion ---------------------------------------------------------------------- 05
5. Reference ------------------------------------------------------------------------- 05

TMSL/CSE/CA2/2024-25/Semester-8 2
7 (a) Steps Involved in SSL Protocol
The Secure Sockets Layer (SSL) Protocol ensures encrypted and secure communication between a
client (such as a web browser) and a server. The process follows these main steps:

1. Handshake Phase:
o The client sends a request to the server to establish a secure connection, along with
supported encryption algorithms and SSL version.
o The server responds by selecting the encryption algorithm and sending its digital
certificate (containing the public key) to the client.
2. Authentication & Key Exchange:
o The client verifies the server’s certificate against a trusted Certificate Authority (CA).
o If the certificate is valid, the client generates a session key and encrypts it using the
server’s public key. This encrypted key is then sent to the server.
3. Session Key Generation:
o The server decrypts the received session key using its private key.
o Both client and server now have a shared symmetric session key for encrypting
further communication.
4. Secure Data Transmission:
o Using the session key, both parties encrypt and decrypt messages, ensuring
confidentiality and data integrity.
5. Session Termination:
o Once the communication is complete, either party can initiate a session termination
request.
o The session key is discarded, and the connection is securely closed.

7(b) Advantages of SSL Protocol


1. Data Encryption:
o Ensures that all transmitted data remains confidential and cannot be read by attackers.
2. Authentication:
o Verifies the identity of the communicating parties through digital certificates,
preventing impersonation and man-in-the-middle (MITM) attacks.
3. Data Integrity:
o message authentication codes (MAC) to ensure that the transmitted data is not altered
during transmission.

TMSL/CSE/CA2/2024-25/Semester-8 3
4. Secure Transactions:
o Commonly used in online banking, e-commerce, and sensitive data transfers to ensure
customer trust.
5. Improved SEO Ranking:
o Websites using SSL (HTTPS) receive better rankings in search engines like Google.

7(c) Difference Between SSL and TLS


Although SSL (Secure Sockets Layer) and TLS (Transport Layer Security) serve the same
purpose, they have key differences:

SSL (Secure Sockets


Feature TLS (Transport Layer Security)
Layer)
Less secure, vulnerable to More secure, with improved encryption and
Security Level attacks authentication
TLS 1.0, 1.1, 1.2, 1.3 (latest and most
Versions SSL 2.0, SSL 3.0 (obsolete)
secure)
Faster handshake and improved
Handshake Process More complex and slower performance
Supports outdated
Cipher Suites algorithms
Uses stronger encryption algorithms

Message Uses MAC (Message Uses HMAC (Hashed Message


Authentication Authentication Code) Authentication Code) for better security
Usage Today Deprecated, no longer in use Actively used for secure communication

TMSL/CSE/CA2/2024-25/Semester-8 4
Conclusion:
 SSL is an older protocol that has been replaced by TLS due to security vulnerabilities.
 TLS provides better encryption, faster performance, and stronger authentication methods.
 Today, TLS 1.2 and TLS 1.3 are the preferred protocols for securing online
communications.

Reference :
Here are two books that cover SSL, TLS, and network security in detail:

1. "SSL and TLS: Theory and Practice" – Rolf Oppliger


o This book provides a deep understanding of the SSL/TLS protocols, their
cryptographic foundations, and practical implementation.
2. "Network Security with OpenSSL" – John Viega, Matt Messier, and Pravir Chandra
o This book explains how SSL and TLS work, how to use OpenSSL, and how to
implement secure communication in applications.

These books are great resources for understanding both the theoretical and practical aspects of
SSL/TLS security.

TMSL/CSE/CA2/2024-25/Semester-8 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy