Types of Internet Security Protocols
In today’s world, we transfer the data in bulk, and the security of this data is very important, so Internet security provides that feature i.e., protection of data. There are different types of protocol exist like routing, mail transfer, and remote communication protocol. But the Internet security protocol helps in the security and integrity of data over the internet. There are many protocols that exist that help in the security of data over the internet such as Secure Socket Layer (SSL), Transport Layer Security (TLS).
Now, let us look at the various types of Internet Security Protocols :
- SSL Protocol :
- SSL Protocol stands for Secure Sockets Layer protocol, which is an encryption-based Internet security protocol that protects confidentiality and integrity of data.
- SSL is used to ensure the privacy and authenticity of data over the internet.
- SSL is located between the application and transport layers.
- At first, SSL contained security flaws and was quickly replaced by the first version of TLS that’s why SSL is the predecessor of the modern TLS encryption.
- TLS/SSL website has “HTTPS” in its URL rather than “HTTP”.
- SSL is divided into three sub-protocols: the Handshake Protocol, the Record Protocol, and the Alert Protocol.
- TLS Protocol :
- Same as SSL, TLS which stands for Transport Layer Security is widely used for the privacy and security of data over the internet.
- TLS uses a pseudo-random algorithm to generate the master secret which is a key used for the encryption between the protocol client and protocol server.
- TLS is basically used for encrypting communication between online servers like a web browser loading a web page in the online server.
- TLS also has three sub-protocols the same as SSL protocol – Handshake Protocol, Record Protocol, and Alert Protocol.
- SHTTP :
- SHTTP stands for Secure HyperText Transfer Protocol, which is a collection of security measures like Establishing strong passwords, setting up a firewall, thinking of antivirus protection, and so on designed to secure internet communication.
- SHTTP includes data entry forms that are used to input data, which has previously been collected into a database. As well as internet-based transactions.
- SHTTP’s services are quite comparable to those of the SSL protocol.
- Secure HyperText Transfer Protocol works at the application layer (that defines the shared communications protocols and interface methods used by hosts in a network) and is thus closely linked with HTTP.
- SHTTP can authenticate and encrypt HTTP traffic between the client and the server.
- SHTTP operates on a message-by-message basis. It can encrypt and sign individual messages.
- Set Protocol :
- Secure Electronic Transaction (SET) is a method that assures the security and integrity of electronic transactions made using credit cards.
- SET is not a payment system; rather, it is a secure transaction protocol that is used via the internet.
- The SET protocol provides the following services:
- It establishes a safe channel of communication between all parties engaged in an e-commerce transaction.
- It provides confidentiality since the information is only available to the parties engaged in a transaction when and when it is needed.
- The SET protocol includes the following participants:
- Payment Gateway
- Certification Authority
- PEM Protocol :
- PEM Protocol stands for privacy-enhanced mail and is used for email security over the internet.
- RFC 1421, RFC 1422, RFC 1423, and RFC 1424 are the four particular papers that explain the Privacy Enhanced Mail protocol.
- It is capable of performing cryptographic operations such as encryption, nonrepudiation, and message integrity.
- PGP Protocol :
- PGP Protocol stands for Pretty Good Privacy, and it is simple to use and free, including its source code documentation.
- It also meets the fundamental criteria of cryptography.
- When compared to the PEM protocol, the PGP protocol has grown in popularity and use.
- The PGP protocol includes cryptographic features such as encryption, non-repudiation, and message integrity.
My Personal Notes arrow_drop_up
Please Login to comment...