LT   EN   RU  
Monday 26 October 2020 - Independent and informative portal
Register   Login
News subscribe
Subscribe   Unsubscribe
Visits since 2002 09 12 - 66992698
Pages in 40735
  Computers > Computer technologies > Security > SSL certificates
Lankomumo reitingas Print version Print version
What is SSL?

The SSL (Secure Sockets Layer) Handshake Protocol [Hic95] was developed by Netscape Communications Corporation to provide security and privacy over the Internet. The protocol supports server and client authentication. The SSL protocol is application independent, allowing protocols like HTTP (HyperText Transfer Protocol), FTP (File Transfer Protocol), and Telnet to be layered on top of it transparently. Still, SSL is optimized for HTTP; for FTP, IPSec (see Question 5.1.4) might be preferable. The SSL protocol is able to negotiate encryption keys as well as authenticate the server before data is exchanged by the higher-level application. The SSL protocol maintains the security and integrity of the transmission channel by using encryption, authentication and message authentication codes.

The SSL Handshake Protocol consists of two phases: server authentication and an optional client authentication. In the first phase, the server, in response to a client's request, sends its certificate and its cipher preferences. The client then generates a master key, which it encrypts with the server's public key, and transmits the encrypted master key to the server. The server recovers the master key and authenticates itself to the client by returning a message authenticated with the master key. Subsequent data is encrypted and authenticated with keys derived from this master key. In the optional second phase, the server sends a challenge to the client. The client authenticates itself to the server by returning the client's digital signature on the challenge, as well as its public-key certificate.

A variety of cryptographic algorithms are supported by SSL. During the ``handshaking'' process, the RSA public-key cryptosystem (see Section 3.1) is used. After the exchange of keys, a number of ciphers are used. These include RC2 (see Question 3.6.2), RC4 (see Question 3.6.3), IDEA (see Question 3.6.7), DES (see Section 3.2), and triple-DES (see Question 3.2.6). The MD5 message-digest algorithm (see Question 3.6.6) is also used. The public-key certificates follow the X.509 syntax (see Question 5.3.3).

For more information on SSL 3.0, see

TLS (Transport Layer Security) is a protocol that is based on and very similar to SSL 3.0; for more information about TLS 1.0, see

We should also mention WTLS (Wireless TLS), which specifies the security layer protocol in WAP (Wireless Application Protocol); WAP is the de facto standard for the delivery and presentation of information to wireless devices such as mobile phones and pagers. WTLS is very similar to TLS but optimized for low-bandwidth bearer networks. For more information on WAP and WTLS, see

Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version

Random tags:    Hobby (25)    Computer piracy (10)    PHP (3)    Skydiving (10)    Mysticism 2 (3)    Cats (14)    Intercourse (265)    Helping and prevention (14)    Telecomunication (40)    Architecture (2)    Beer (10)    Sport gymnastics (9)    Narcotics no (13)    Printers (12)    History (4)    Religion (34)    Mother and child (17)    Badminton (3)    Communication (38)    Internet (4)    Cryptography (10)    Viruses (10)    Vampire (6)    Business (25)    Heathendom (3)    Casino’s (10)    Literature (24)    Show-business (11)    Mobile communication (9)    Cinema (20)    Formula 1 (2)    Guns (11)    Animals (65)    Politics (13)    Linux/Unix (2)    Fishing (14)    Sound systems (10)    Tales (13)    E - commerce (10)    Computer games (64)    S.Valiulis (2)    Dolphins (6)    Pedagogics (10)    Culture (57)    Pubic Hair Fashion (15)    Economics2 (2)    Modems (2)    Buddhism (10)    Yoga (4)    Love (48)
1. Introduction to SSL certificates
2. Internet Explorer, SSL and binary data
3. Where should I get my SSL Certificate?
4. What is SSL? And how can I use it?
5. MIDP Application Security 2: Understanding SSL and TLS
6. What is SSL (the "little padlock")?
7. RSA Security and GeoTrust Announce Strategic Partnership to Offer Digital Certificate Solutions
8. How do I generate a Certificate Signing Request (CSR) for my web server?
9. SSL toolkit flaw poses risk
1. MIDP Application Security 2: Understanding SSL and TLS
2. How do I generate a Certificate Signing Request (CSR) for my web server?
3. Where should I get my SSL Certificate?
4. RSA Security and GeoTrust Announce Strategic Partnership to Offer Digital Certificate Solutions
5. Internet Explorer, SSL and binary data
6. Introduction to SSL certificates
7. What is SSL? And how can I use it?
8. SSL toolkit flaw poses risk
9. What is SSL (the "little padlock")?