Encyclopedia > Secure Sockets Layer

  Article Content

Transport Layer Security

Redirected from Secure Sockets Layer

Secure Sockets Layer or SSL is a protocol designed by Netscape Communications Corporation to provide encrypted communications on the Internet. SSL Version 3.0, released in 1996, was later used as a basis to develop Transport Layer Security or TLS, an IETF standard protocol. TLS was first defined in RFC 2246[?]: "The TLS Protocol Version 1.0".

These protocols provide communications privacy over the Internet, using cryptography. They allow client/server applications to communicate in a way that is designed to prevent eavesdropping[?], tampering[?], or message forgery[?].

They are layered beneath application protocols such as HTTP, SMTP and NNTP and above the TCP transport protocol, part of the TCP-IP protocol suite. While both SSL and TLS can be used to add security to any protocol that uses TCP, they is most commonly used in the HTTPS access method. HTTPS is used to secure World Wide Web pages for applications such as Electronic commerce. Both protocols use public key cryptography and public key certificates to identify the identity of endpoints.

Like SSL, on which is was based, TLS is a modular protocol, designed to be extended, with support for forwards and backwards compatibility and negotiation between peers.

Both TLS and SSL involve a number of basic phases:

  • peer negotiation for algorithm support
  • public key encryption based key exchange and certificate-based identification
  • symmetric cipher based traffic encryption

Some early versions of SSL used 40-bit symmetric keys because of restrictions on the export of cryptographic technology[?]. These were quickly abandoned as insecure: the 40-bit key space was simply too small, and could be exhausted by brute force search. Modern implementations use 128-bit keys for symmetric cipher encryption.

TLS has subsequently been extended by other RFCs including:

  • RFC 2712[?] "Addition of Kerberos Cipher Suites to Transport Layer Security (TLS)". The 40-bit ciphersuites defined in this memo are included only for the purpose of documenting the fact that those ciphersuite codes have already been assigned.

  • RFC 2817[?] "Upgrading to TLS Within HTTP/1.1", explains how to use the Upgrade mechanism in HTTP/1.1 to initiate Transport Layer Security (TLS) over an existing TCP connection. This allows unsecured and secured HTTP traffic to share the same well known port (in this case, http: at 80 rather than https: at 443).

  • RFC 2818[?] "HTTP Over TLS", distinguishs secured traffic from insecure traffic by the use of a different server port.

  • RFC 3268[?] "AES Ciphersuites for TLS". Adds enhanced by the addition of Advanced Encryption Standard (AES) ciphersuites[?] to the previously existing symmetric ciphers, like RC2, RC4, International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), and triple DES.

While an increasing number of client and server products can support TLS or SSL natively, there are many that still do not. In these cases, you may wish to use standalone SSL products like Stunnel to provide SSL encryption.

External links


This article (or an earlier version of it) contains material from FOLDOC's article on SSL (http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Secure+Sockets+Layer), used with permission.



All Wikipedia text is available under the terms of the GNU Free Documentation License

 
  Search Encyclopedia

Search over one million articles, find something about almost anything!
 
 
  
  Featured Article
Sanskrit language

... one component is related to another. For example, a doghouse is a dative compound, a house for a dog. It would be called a "caturtitatpurusha" (caturti refers to the ...

 
 
 
This page was created in 29.1 ms