Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication over a computer network. It is widely used in applications such as web browsing, email, instant messaging, and voice over IP (VoIP). TLS is the successor to the now-deprecated Secure Sockets Layer (SSL) protocol.
History[edit | edit source]
TLS was first defined in 1999 as an upgrade to SSL 3.0. The protocol has undergone several revisions, with the most recent version being TLS 1.3, which was published in August 2018. The development of TLS is overseen by the Internet Engineering Task Force (IETF).
Protocol Overview[edit | edit source]
TLS operates in the application layer and is designed to provide three main services:
- Encryption: Ensures that the data being transferred is only readable by the intended recipient.
- Authentication: Verifies the identity of the parties involved in the communication.
- Data integrity: Ensures that the data has not been tampered with during transit.
Handshake Process[edit | edit source]
The TLS handshake is a multi-step process that establishes a secure connection between a client and a server. The main steps include: 1. **Client Hello**: The client sends a message to the server with its supported cipher suites and other settings. 2. **Server Hello**: The server responds with its chosen cipher suite and its digital certificate. 3. **Key Exchange**: Both parties exchange keys to establish a shared secret. 4. **Finished**: Both parties confirm that the handshake is complete and secure communication can begin.
Cipher Suites[edit | edit source]
A cipher suite is a combination of algorithms that define how TLS will perform encryption, authentication, and data integrity. Commonly used cipher suites include:
- AES (Advanced Encryption Standard)
- RSA (Rivest–Shamir–Adleman)
- ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
Applications[edit | edit source]
TLS is used in a variety of applications to secure data transmission:
- HTTPS: Secures web traffic between browsers and servers.
- SMTP: Secures email transmission.
- IMAP and POP3: Secure email retrieval.
- FTPS: Secures file transfers.
Security Considerations[edit | edit source]
While TLS is designed to be secure, it is not immune to vulnerabilities. Common issues include:
- Man-in-the-middle attacks
- Downgrade attacks
- Heartbleed vulnerability
Related Pages[edit | edit source]
- Secure Sockets Layer
- Internet Engineering Task Force
- Encryption
- Authentication
- Data integrity
- Cipher suite
- HTTPS
- Man-in-the-middle attack
- Heartbleed
See Also[edit | edit source]
- Public key infrastructure
- Digital certificate
- Elliptic-curve cryptography
- Diffie–Hellman key exchange
References[edit | edit source]
External Links[edit | edit source]
Search WikiMD
Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD
WikiMD's Wellness Encyclopedia |
Let Food Be Thy Medicine Medicine Thy Food - Hippocrates |
Translate this page: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
தமிழ்,
తెలుగు,
Urdu,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
বাংলা
European
español,
Deutsch,
français,
Greek,
português do Brasil,
polski,
română,
русский,
Nederlands,
norsk,
svenska,
suomi,
Italian
Middle Eastern & African
عربى,
Turkish,
Persian,
Hebrew,
Afrikaans,
isiZulu,
Kiswahili,
Other
Bulgarian,
Hungarian,
Czech,
Swedish,
മലയാളം,
मराठी,
ਪੰਜਾਬੀ,
ગુજરાતી,
Portuguese,
Ukrainian
Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.
Contributors: Prab R. Tumpati, MD