Lesson 04 Research Assignment

docx

School

Palm Beach State College *

*We aren’t endorsed by this school

Course

1712

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by CLAUDIAMESA7677

Report
1 Title: Understanding SSL and TLS: Ensuring Secure Communication Claudia Mesa Palm Beach State Collage CNT 4408 1 Information System Security Dwight Elliott February 3 rd . 2024 1
2 Title: Understanding SSL and TLS: Ensuring Secure Communication Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide secure communication over a computer network. These protocols are widely used to establish encrypted links between a web server and a browser, ensuring the confidentiality and integrity of data transmitted over the internet. This report aims to explain how SSL and TLS work to secure communication, based on the information provided by the referenced page. SSL and TLS Overview: SSL and TLS protocols encrypt data exchanged between clients and servers, preventing unauthorized access and tampering. TLS is an updated version of SSL and is considered more secure. TLS versions include TLS 1.0, TLS 1.1, TLS 1.2, and TLS 1.3, each improving upon the security and efficiency of the previous versions. Handshake Process: The SSL/TLS handshake process initiates a secure connection between the client and the server. It involves the following steps: 1. Client Hello: The client sends a message to the server, indicating its intention to establish a secure connection and listing supported cryptographic algorithms. 2. Server Hello: The server responds to the client's message, selecting the strongest cryptographic algorithm and sending its digital certificate. 3. Certificate Verification: The client verifies the server's digital certificate to ensure it is valid and issued by a trusted Certificate Authority (CA). 2
3 4. Key Exchange: The client and server agree on a session key to encrypt and decrypt data transmitted during the session. This key is generated using public-key cryptography or symmetric-key encryption. 5. Cipher Suite Selection: Based on the agreed-upon cryptographic algorithm, the client and server select a cipher suite to secure the communication. 6. Session Establishment: Once the handshake process is complete, a secure session is established, and data transmission begins. Encryption and Decryption: During the secure session, data exchanged between the client and server is encrypted using the session key negotiated during the handshake process. Symmetric- key encryption is commonly used for bulk data encryption due to its efficiency, while public-key cryptography is used for key exchange and digital signatures. Data Integrity: SSL/TLS protocols ensure data integrity by appending a Message Authentication Code (MAC) to transmitted data. The MAC is generated using cryptographic hash functions and ensures that data remains unchanged during transmission. SSL and TLS protocols play a crucial role in securing communication over the internet. Through encryption, key exchange mechanisms, and data integrity checks, SSL/TLS protocols ensure that sensitive information remains confidential and untampered during transmission. Understanding the handshake process, encryption methods, and data integrity mechanisms is essential for implementing secure communication channels in various online applications and services. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References Ciampa, M. (2017). CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning.  Tyson, J. (n.d.). How Encryption Works. Retrieved from https://computer.howstuffworks.com/encryption4.htm 4