Transport Layer Securities (TLS) are designed to provide security at the transport layer. TLS was derived from a security protocol called Secure Service Layer (SSL). TLS ensures that no third party may eavdrops or tamper with any message.
There are several benefits of TLS:
TLS/SSL can help to secure transmitted data using encryption.
TLS/SSL works with most web browsers, including Microsoft Internet Explorer and on most operating systems and web servers.
- Algorithm flexibility:
TLS/SSL provides operations for authentication mechanism, encryption algorithms and hashing algorithm that are used during the secure session.
- Ease of Deployment:
Many applications TLS/SSL temporarily on a windows server 2003 operating systems.
- Ease of Use:
Because we implement TLS/SSL beneath the application layer, most of its operations are completely invisible to client.
Working of TLS:
The client connect to server (using TCP), the client will be something. The client sends number of specification:
- Version of SSL/TLS.
- which cipher suites, compression method it wants to use.
The server checks what the highest SSL/TLS version is that is supported by them both, picks a cipher suite from one of the clients option (if it supports one) and optionally picks a compression method. After this the basic setup is done, the server provides its certificate. This certificate must be trusted either by the client itself or a party that the client trusts. Having verified the certificate and being certain this server really is who he claims to be (and not a man in the middle), a key is exchanged. This can be a public key, “PreMasterSecret” or simply nothing depending upon cipher suite.
Both the server and client can now compute the key for symmetric encryption. The handshake is finished and the two hosts can communicate securely. To close a connection by finishing. TCP connection both sides will know the connection was improperly terminated. The connection cannot be compromised by this through, merely interrupted.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Secure Socket Layer (SSL) and Transport Layer Security (TLS)
- Transport Layer Security (TLS) Handshake
- Multiplexing and Demultiplexing in Transport Layer
- Transport Layer responsibilities
- TCP and UDP in Transport Layer
- Difference between layer-2 and layer-3 switches
- Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) in Data Link Layer
- Difference between Cyber Security and Information Security
- Difference between Network Security and Cyber Security
- Difference between Information Security and Network Security
- How Security System Should Evolve to Handle Cyber Security Threats and Vulnerabilities?
- Real-time Transport Control Protocol (RTCP)
- Real Time Transport Protocol (RTP)
- Introduction of Message Queue Telemetry Transport Protocol (MQTT)
- Traceroute in Network Layer
- Domain Name System (DNS) in Application Layer
- Protocols in Application Layer
- File Transfer Protocol (FTP) in Application Layer
- Framing in Data Link Layer
- Inter VLAN Routing by Layer 3 Switch
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.