0% found this document useful (0 votes)
145 views2 pages

TLS

Transport Layer Security (TLS) is a protocol that provides encryption and security for communication over the Internet. It works by having the client and server perform a handshake at the start of a connection to negotiate capabilities and exchange certificates to authenticate each other. They then exchange encrypted messages to establish a shared secret key for encrypting all further communication on that connection, ensuring confidentiality of data exchanged over the Internet. While the handshake process may seem lengthy, it typically takes less than a second to complete. TLS is commonly used to secure email transmission and websites, and its implementation depends on the specific software or hardware being used.

Uploaded by

Salman Shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views2 pages

TLS

Transport Layer Security (TLS) is a protocol that provides encryption and security for communication over the Internet. It works by having the client and server perform a handshake at the start of a connection to negotiate capabilities and exchange certificates to authenticate each other. They then exchange encrypted messages to establish a shared secret key for encrypting all further communication on that connection, ensuring confidentiality of data exchanged over the Internet. While the handshake process may seem lengthy, it typically takes less than a second to complete. TLS is commonly used to secure email transmission and websites, and its implementation depends on the specific software or hardware being used.

Uploaded by

Salman Shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Transport Layer Security (TLS)

Definition: Transport Layer Security (TLS) is a protocol that provides security for
communication over the Internet. TLS encrypts segments of network connections, in
order to provide confidentiality when communicating via the Internet.

How Does TLS Work?

A TLS session begins with a handshake. The client first sends the server a hello message
that lists the client’s supported capabilities. The server responds back with its own hello
message, with its choice of one of the available listed capabilities, to ensure the client and
the server will be able to speak the same language.

The server then sends its certificate, which contains its public key, and may request a
certificate from the client if client authentication is required. The client checks to see if
it’s a valid certificate, and sends its own back if necessary.

The client then sends a random number that has been encrypted with the server's public
key. After this number is decrypted by the server, the client and server will have a
common key that can be used to the send and receive data that only the pair of them can
understand. Both the client and server then send messages notifying the other that all
further communication will be encrypted and both send final messages that are actually
encrypted, ending the handshake and allowing encrypted data exchange to begin.

While this may seem like a lengthy process, a TLS/SSL handshake in most cases takes
less than a second.

*Note: In the case of email servers communicating via TLS, both systems are
actually servers.

Does My Organization Need To Use TLS?

Whether you need to use TLS/SSL depends on your organization's activities. For
organizations involved in health services or payment processing, using a security protocol
such as TLS/SSL to encrypt network communications may be a federal or commercial
requirement. For other organizations, using TLS/SSL might simply be a good idea
How TLS Increases Email Security

TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the
successor to the Secure Sockets Layer (SSL).

How To Implement TLS

TLS implementation varies greatly depending on the server it is to be installed on, please
see instructions pertaining to your software/hardware vendor. A common step that would
apply to all implementations would be to acquire a digital certificate for each server.
These certificates may be from a Certificate Authority, or self-signed.

For further information, please view the following links:

http://www.techsoup.org/learningcenter/networks/page11959.cfm

http://www.networkworld.com/newsletters/gwm/0329gw1.html

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy