Transport Layer Security
12
Transport Layer Security (TLS) Presented by : Chhatra Thapa Presentation on :
-
Upload
chhatra-thapa -
Category
Documents
-
view
544 -
download
0
Transcript of Transport Layer Security
![Page 1: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/1.jpg)
Transport Layer Security (TLS)
Presented by : Chhatra Thapa
Presentation on :
![Page 2: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/2.jpg)
Two protocols are dominant today for providing security at the transport layer
Secure Sockets Layer (SSL) protocol
Transport Layer Security (TLS) protocol
![Page 3: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/3.jpg)
Definition:
Transport Layer Security (TLS) was designed to provide security at the transport layer.
TLS was derived from a security protocol called Secure Sockets Layer (SSL).
![Page 4: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/4.jpg)
Location of SSL and TSL in the Internet mode
![Page 5: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/5.jpg)
TLS layers : Four TLS protocol
![Page 6: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/6.jpg)
1. Handshake protocol
![Page 7: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/7.jpg)
Hash for Certificate Verify message in TLS
![Page 8: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/8.jpg)
Hash for Finished message in TLS
![Page 9: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/9.jpg)
2. Change Cipher Spec Protocol
![Page 10: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/10.jpg)
3. Alert protocol
![Page 11: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/11.jpg)
4. Record protocol
![Page 12: Transport Layer Security](https://reader035.fdocuments.in/reader035/viewer/2022062706/55757241d8b42a2e248b5286/html5/thumbnails/12.jpg)