logo

Network Security in SSL Communication

Analyse and write a report on the processes and security technologies used when accessing a website via a web browser, focusing on authentication and server-client communication verification.

12 Pages1639 Words396 Views
   

Added on  2023-06-08

About This Document

This paper discusses the processes and security technologies while accessing websites which uses HTTPS. It covers authentication, confidentiality and integrity, and Anti-Replay in SSL communication. The report provides practical evidence with screenshots and meets all the requirements of the report in an adequate manner.

Network Security in SSL Communication

Analyse and write a report on the processes and security technologies used when accessing a website via a web browser, focusing on authentication and server-client communication verification.

   Added on 2023-06-08

ShareRelated Documents
Running head: NETWORK SECURITY
Subject Name
Network Security
Student name
Student ID
Submission Date
Network Security in SSL Communication_1
1NETWORK SECURITY
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Authentication Process................................................................................................................2
Confidentiality and Integrity Process..........................................................................................5
Protection against Replay Attacks in SSL...................................................................................7
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Network Security in SSL Communication_2
2NETWORK SECURITY
TABLE OF FIGURES
Figure 1 screenshot of secure connection........................................................................................4
Figure 2 Non secured Connection...................................................................................................4
Figure 3Digital Signature................................................................................................................5
Figure 4 Hash Algorithm and Symmetric Encryption.....................................................................8
Network Security in SSL Communication_3
3NETWORK SECURITY
Introduction
This paper intends to discuss the processes and the security technologies while accessing
websites which uses HTTPS. The communication between the user and web server are likely to
be attacked and thus there is a need to analyze the technologies that are required to prevent
attackers from modifying communication. The central idea of this paper is to discuss
authentication, confidentiality and integrity and Anti-Replay in order to address the requirements
of the report. It would also provide the evidence of the practical part associated with specific
topics with the help of screenshots. It can be concluded that this paper would be effective in
addressing all the requirements.
Discussion
Authentication Process
Communication of Web Browser with the Right Server
The communication of web browser and web server is achieved with the web server with
the help of TCP/IP. The communication protocol in a hypertext transfer protocol secure (Https)
is encrypted with the help of a secured socket layer (SSL). The browser ensures that it is
communicating to a right server with the help of the certificate authorities. These certificate
authorities are pre-installed in the software of the websites [1]. For instance, the certificate
authorities of Global Sign and Go Daddy provides certificates, and they are considered as the
trusted by the web browsers. The fig 1 and fig 2 shows the secured and not secured connection
for better illustration.
Network Security in SSL Communication_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Enhancing Cyber Security with VPN, SSL and Digital Signatures
|10
|1977
|395

Virtual Private Networks: Ensuring Security and Integrity of Data
|12
|2219
|342

Advanced Network Security: Cryptography, Access Control, Firewalls, and Wireless Network Security
|11
|1783
|206

Public Key Infrastructure
|4
|721
|101

Advanced Network Security - PDF
|9
|1400
|70

Advanced Network Security : PDF
|10
|1144
|216