7
SSL Walkthrough High level view of SSL keithrozario.com

Introduction to SSL/TLS

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Introduction to SSL/TLS

SSL WalkthroughHigh level view of SSL

keithrozario.com

Page 2: Introduction to SSL/TLS

Step 1: Client accesses website

Client

Browser connects to website Web Server

Page 3: Introduction to SSL/TLS

Step 2: Server responds with Certificate

Client

Server responds with Certificate and key Web Server

Page 4: Introduction to SSL/TLS

Step 3: Client verifies with CA

Client Web Server

CA

Client verifies certificate with CA

Page 5: Introduction to SSL/TLS

Step 4: Client sends random key to server

Client Web Server

Random Key

Client sends a random key to server encrypted with the public key

Page 6: Introduction to SSL/TLS

Step 5: All communications are now encrypted with the Random key

Client Web Server

Random Key

Page 7: Introduction to SSL/TLS

Notes

All data encrypted with the servers public key can only be decrypted by the servers private key

The randomly generated key was: Randomly Generated by the client Encrypted with the servers public key

Only the Server and the Client would know the key, and unless they share it no one else would know.

Therefore encrypting the Data with the random key secures the data from prying eyes.

In most applications of SSL/TLS the key type, cipher and hash can be configured based on client and server requirements. It is this that determines the security of your connection, although SSL isn’t without it’s vulnerabilities.