HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Secure Socket Layer (SSL)
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Secure Socket Layer (SSL)  
> Access to the content HTML Beginning of the presentation  
> Description Overview of the Secure Socket Layer (SSL) protocol.  
> Context & Dates Talk made before the SUR group from the OSSIR , on 22 April 1997.
 
> Author Tristan Debeaupuis 
> Type 49 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Plan
Qu'est-ce que SSL ?
Caractéristiques de SSL
Buts de SSL
Histoire

Architecture
Architecture de SSL
Les algorithmes de chiffrement
Générateur de codons
RC4
MD5
SHA
DSS

La génération des clés
Le générateur pseudo-aléatoire
Combinaison des fonctions de hachage
Calcul des clés

Les couches protocolaires
Les couches protocolaires
Record Layer
Les variables d'état
Handshake Protocol
Certificat X509
Change cipher spec protocol
Alert protocol
Une négociation

Les flux
Définition des flux sur un routeur
Attaques connues : Attaque exhaustive
Attaque sur le générateur de codons

Les implémentations
Les implémentations

L'avenir
L'avenir
IETF TLS 1.0 brouillon 2 de mars 1997
Questions
Conclusion
Questions ?

Principe de fonctionnement  

> Related documents
themeSSL (Secure Socket Layer)
[Course]  Data Exchanges Security: IPsec, SSL, SSH
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  Firewalls are not dead [10 May 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  SSLtunnel for Windows [22 September 2004 - French]
[Tip]  FTP over SSL [2 August 2004 - ]
[Presentation]  SSLTunnel : VPN for roadwarriors [4 February 2004 - French]
[Tool]  SSLTunnel tool [PPP VPN on SSL - English]
[Tip]  HTTP/HTTPS authentication methods [10 March 2003 - French]
[Presentation]  OpenSSL and applications of OpenSSL [6 November 2002 - French]
[Presentation]  Monkey in the Middle Attacks against SSH and HTTPS [23 January 2002 - French]
[Tip]  Apache: Virtual hosts and SSL (mod_ssl) [21 December 2001 - French]
[Tip]  Using OpenSSL for SSL/TLS applications [21 December 2001 - French]
[Tip]  Why HTTPS is not web security [7 May 2001 - English]
[Presentation]  Monkey in the middle attacks against SSH and HTTPS [6 February 2001 - French]
[Tip]  Instaling postfix with TLS (secure mail server) [30 November 2000 - French]
[Presentation]  Network encryption: IPsec, SSL, SSH [26 September 2000 - English]
[Presentation]  SMTP-TLS: Towards securing SMTP [11 September 2000 - French]
[Presentation]  Network Encryption: IPsec, SSL, SSH [26 April 2000 - French/English]
[Presentation]  Network Security with Linux: SSL, IPsec, SSH [1 February 2000 - French]
> Copyright © 1997, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 22 April 2002 at 15:11:13 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants