[go: up one dir, main page]

0% found this document useful (0 votes)
4 views6 pages

Module 5

This is for reference

Uploaded by

Manoj Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views6 pages

Module 5

This is for reference

Uploaded by

Manoj Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Module 5

1. 1) Transport-Level Security
Here’s your detailed 10-mark answer for Transport-Level Security (TLS) so you can write it
exactly in your exam — with a diagram included.

Q. Explain Transport-Level Security (TLS) with diagram.

1. Definition (2 Marks)

Transport-Level Security (TLS) is a cryptographic protocol designed to secure communication


over a network.

It ensures:

 Confidentiality – Only the intended recipient can read the data.


 Integrity – Data cannot be altered during transmission.
 Authentication – Verifies the identity of the communicating parties using digital
certificates.

TLS is the successor to Secure Sockets Layer (SSL), offering stronger encryption and better
security mechanisms.

2. Purpose (2 Marks)

a) Confidentiality:

Data is encrypted so that even if intercepted, it cannot be read without the correct decryption key.
b) Integrity:

TLS uses Message Authentication Codes (MACs) to ensure that no unauthorized changes
occur in the transmitted data.

c) Authentication:

TLS uses X.509 certificates issued by trusted Certificate Authorities (CAs) to verify server (and
optionally client) identity.

3. Working of TLS – Handshake Process (3 Marks)

1. Client Hello:

The client sends:

o Supported TLS versions


o List of cipher suites
o A random number for key generation
2. Server Hello:
o Server chooses a cipher suite from the client’s list
o Sends its digital certificate for authentication
3. Key Exchange:
o Using RSA or Diffie-Hellman methods, the client and server agree on a session
key.
4. Change Cipher Spec:
o Both sides switch to encrypted communication using the session key.
5. Finished Messages:
o Encrypted confirmation messages are exchanged to indicate the secure session is
ready.

4. Components (1 Mark)

 Handshake Protocol: Sets up encryption and authentication parameters.


 Record Protocol: Encrypts and ensures integrity of application data.
 Alert Protocol: Sends warnings or errors (e.g., handshake failure).

5. Advantages (1 Mark)
 Strong encryption prevents eavesdropping.
 Authentication ensures trust between parties.
 Integrity checks protect against data tampering.

6. Diagram (1 Mark)

Below is a simple TLS Handshake Diagram you can draw in the exam:

Client Server
| Client Hello ----------------> |
| <--------------- Server Hello |
| <--------------- Certificate |
| Key Exchange ----------------> |
| <----------- Change Cipher Spec |
| Change Cipher Spec ------------>|
| Finished --------------------->|
| <-------------------- Finished |

If you want, I can also give you a neatly labeled box-and-arrow diagram for TLS that you can
directly copy into your answer sheet so it looks more professional and earns full marks.

Do you want me to prepare that?

2) Secure Sockets Layer (SSL)

Here’s a detailed, exam-ready answer for Secure Sockets Layer (SSL) in the same style as your
TLS notes.

Q. Explain Secure Sockets Layer (SSL) with diagram.

1.

Definition

(2 Marks)
Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide secure
communication over the internet. It encrypts the data between the client (e.g., a web browser)
and the server, ensuring confidentiality, integrity, and authentication. SSL is the predecessor of
Transport Layer Security (TLS), but the term “SSL” is still commonly used for both.

2.

Purpose

(2 Marks)

 Confidentiality: Encrypts the data so only the intended recipient can read it.
 Integrity: Detects any alteration in the data during transmission.
 Authentication: Uses digital certificates to verify the identity of the server (and
optionally the client).

3.

Working of SSL (Handshake Process)

(3 Marks)

1. Client Hello:
o The client sends the supported SSL versions, cipher suites, and a random number.
2. Server Hello:
o The server selects a cipher suite and sends its digital certificate.
3. Server Authentication & Key Exchange:
o The client verifies the server’s certificate and generates a session key (either RSA
key exchange or Diffie-Hellman).
4. Change Cipher Spec:
o Both client and server switch to encrypted communication using the agreed
session key.
5. Finished Messages:
o Both sides send encrypted “finished” messages to confirm the secure connection.

4.
Components

(1 Mark)

 Handshake Protocol: Negotiates encryption and authentication parameters.


 Record Protocol: Breaks application data into blocks, applies encryption, and ensures
integrity.
 Alert Protocol: Sends warnings or error messages (e.g., handshake failure).

5.

Advantages

(1 Mark)

 Protects sensitive data like passwords, credit card details, etc.


 Ensures trust between client and server.
 Prevents eavesdropping and tampering.

6.

Diagram

(1 Mark)
Client Server
| ---- Client Hello ---> |
| <--- Server Hello ---- |
| <--- Certificate ----- |
| ---- Key Exchange ---> |
| ---- Change Cipher --->|
| <--- Change Cipher ----|
| ---- Finished -------->|
| <--- Finished -------- |
[ Secure Encrypted Link ]

If you want, I can also prepare TLS and SSL together in a comparison table so you can write it
directly for a 10-mark “difference between” question without confusion. Would you like me to
do that next?
3) Web Security Considerations

You might also like