Secure Sockets Layer Protocol
Jump to navigation
Jump to search
A Secure Sockets Layer Protocol is a Cryptographic Protocol that ...
- AKA: SSL.
- See: CSR, HTTPS, Transport Layer Security, X.509, Public-Key Cryptography, Authentication, Symmetric-Key Algorithm, Message Authentication Code.
References
2015
- (Wikipedia, 2015) ⇒ http://en.wikipedia.org/wiki/Transport_Layer_Security Retrieved:2015-1-12.
- Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communication security over the Internet. They use X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom they are communicating , and to exchange a symmetric key. This session key is then used to encrypt data flowing between the parties. This allows for data/message confidentiality, and message authentication codes for message integrity and as a by-product, message authentication. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging, and voice-over-IP (VoIP). An important property in this context is forward secrecy, so the short-term session key cannot be derived from the long-term asymmetric secret key. [1] As a consequence of choosing X.509 certificates, certificate authorities and a public key infrastructure are necessary to verify the relation between a certificate and its owner, as well as to generate, sign, and administer the validity of certificates. While this can be more beneficial than verifying the identities via a web of trust, the 2013_mass surveillance disclosures made it more widely known that certificate authorities are a weak point from a security standpoint, allowing man-in-the-middle attacks (MITM). [2] [3] In the Internet Protocol Suite, TLS and SSL encrypt the data of network connections in the application layer. In OSI model equivalences, TLS/SSL is initialized at layer 5 (session layer) and works at layer 6 (the presentation layer). The session layer has a handshake using an asymmetric cipher in order to establish cipher settings and a shared key for that session; then the presentation layer encrypts the rest of the communication using a symmetric cipher and that session key. In both models, TLS and SSL work on behalf of the underlying transport layer, whose segments carry encrypted data. TLS is an Internet Engineering Task Force (IETF) standards track protocol, first defined in 1999 and last updated in RFC 5246 (August 2008) and RFC 6176 (March 2011). It is based on the earlier SSL specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Navigator web browser.
- ↑ SSL: Intercepted today, decrypted tomorrow, Netcraft, 2013-06-25.
- ↑ Law Enforcement Appliance Subverts SSL, Wired, 2010-04-03.
- ↑ New Research Suggests That Governments May Fake SSL Certificates, EFF, 2010-03-24.