SlideShare a Scribd company logo
1 of 2
Explain how SSL protocol is used to ensure the confidentiality and integrity of the Internet
traffic.
Solution
SSL uses a combination of public-key and symmetric-key encryption to secure a connection
between two machines, typically a Web or mail server and a client machine, communicating over
the Internet or an internal network.
Using the OSI reference model as context, SSL runs above the TCP/IP protocol, which is
responsible for the transport and routing of data over a network, and below higher-level
protocols such as HTTP and IMAP, encrypting the data of network connections in the
application layer of the Internet Protocol suite. The "sockets" part of the term refers to the
sockets method of passing data back and forth between a client and a server program in a
network, or between program layers in the same computer.
The Transport Layer Security (TLS) protocol evolved from SSL and has largely superseded it,
although the terms SSL or SSL/TLS are still commonly used; SSL is often used to refer to what
is actually TLS. The combination of SSL/TLS is the most widely deployed security protocol
used today and is found in applications such as Web browsers, email and basically any situation
where data needs to be securely exchanged over a network, like file transfers, VPN connections,
instant messaging and voice over IP.
The SSL protocol includes two sub-protocols: the record protocol and the "handshake"
protocol. These protocols allow a client to authenticate a server and establish an encrypted SSL
connection. In what's referred to as the "initial handshake process," a server that supports SSL
presents its digital certificate to the client to authenticate the server's identity. Server certificates
follow the X.509 certificate format that is defined by the Public-Key Cryptography Standards
(PKCS). The authentication process uses public-key encryption to validate the digital certificate
and confirm that a server is in fact the server it claims to be.
Once the server has been authenticated, the client and server establish cipher settings and a
shared key to encrypt the information they exchange during the remainder of the session.
This provides data confidentiality and integrity. This whole process is invisible to the user.
For example, if a webpage requires an SSL connection, the URL will change from HTTP to
HTTPS and a padlock icon appears in the browser once the server has been authenticated.
The handshake also allows the client to authenticate itself to the server. In this case, after server
authentication is successfully completed, the client must present its certificate to the server to
authenticate the client's identity before the encrypted SSL session can be established.

More Related Content

Similar to Explain how SSL protocol is used to ensure the confidentiality and int.docx

What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 
White paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSLWhite paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSLGlobalSign
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.pptImXaib
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Https presentation
Https presentationHttps presentation
Https presentationpatel jatin
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
Organizador Grafico.pdf.docx
Organizador Grafico.pdf.docxOrganizador Grafico.pdf.docx
Organizador Grafico.pdf.docxLleliAna
 
Https interception proxies
Https interception proxiesHttps interception proxies
Https interception proxiesgeeksec80
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmIJCSEA Journal
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 

Similar to Explain how SSL protocol is used to ensure the confidentiality and int.docx (20)

Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
White paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSLWhite paper - Full SSL automation with OneClickSSL
White paper - Full SSL automation with OneClickSSL
 
Ssl
SslSsl
Ssl
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
ssl
sslssl
ssl
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
SSL
SSLSSL
SSL
 
Organizador Grafico.pdf.docx
Organizador Grafico.pdf.docxOrganizador Grafico.pdf.docx
Organizador Grafico.pdf.docx
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
ssl's guide
ssl's guidessl's guide
ssl's guide
 
Https interception proxies
Https interception proxiesHttps interception proxies
Https interception proxies
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA Algorithm
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Secure Socket Layer.pptx
Secure Socket Layer.pptxSecure Socket Layer.pptx
Secure Socket Layer.pptx
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 

More from todd401

Exercise 7-15 During October- Wichita Light Company experiences the fo.docx
Exercise 7-15 During October- Wichita Light Company experiences the fo.docxExercise 7-15 During October- Wichita Light Company experiences the fo.docx
Exercise 7-15 During October- Wichita Light Company experiences the fo.docxtodd401
 
Exercise 4-3 (Part Level Submission) The adjusted trial balance column.docx
Exercise 4-3 (Part Level Submission) The adjusted trial balance column.docxExercise 4-3 (Part Level Submission) The adjusted trial balance column.docx
Exercise 4-3 (Part Level Submission) The adjusted trial balance column.docxtodd401
 
examples of how being familiar with and following digital forensic bes.docx
examples of how being familiar with and following digital forensic bes.docxexamples of how being familiar with and following digital forensic bes.docx
examples of how being familiar with and following digital forensic bes.docxtodd401
 
Est 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docx
Est 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docxEst 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docx
Est 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docxtodd401
 
examples of materials that have directional properties as a single cry.docx
examples of materials that have directional properties as a single cry.docxexamples of materials that have directional properties as a single cry.docx
examples of materials that have directional properties as a single cry.docxtodd401
 
Examine the importance for business financial leaders to recognize the.docx
Examine the importance for business financial leaders to recognize the.docxExamine the importance for business financial leaders to recognize the.docx
Examine the importance for business financial leaders to recognize the.docxtodd401
 
Examine the primary reasons why project management causes a cultural c.docx
Examine the primary reasons why project management causes a cultural c.docxExamine the primary reasons why project management causes a cultural c.docx
Examine the primary reasons why project management causes a cultural c.docxtodd401
 
Fal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docx
Fal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docxFal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docx
Fal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docxtodd401
 
Everything compiles and everything runs correctly except my insertionS.docx
Everything compiles and everything runs correctly except my insertionS.docxEverything compiles and everything runs correctly except my insertionS.docx
Everything compiles and everything runs correctly except my insertionS.docxtodd401
 
Explain three advantages and one disadvantage to CONSUMER from standar.docx
Explain three advantages and one disadvantage to CONSUMER from standar.docxExplain three advantages and one disadvantage to CONSUMER from standar.docx
Explain three advantages and one disadvantage to CONSUMER from standar.docxtodd401
 
Explain the various reasons why atoms and molecules form chemical bond.docx
Explain the various reasons why atoms and molecules form chemical bond.docxExplain the various reasons why atoms and molecules form chemical bond.docx
Explain the various reasons why atoms and molecules form chemical bond.docxtodd401
 
Explain (in your own words) the concept colbertism and what-'s interes.docx
Explain (in your own words) the concept colbertism and what-'s interes.docxExplain (in your own words) the concept colbertism and what-'s interes.docx
Explain (in your own words) the concept colbertism and what-'s interes.docxtodd401
 
Explain the 3 Emissive flat-panel devices- electroluminescent- plasma.docx
Explain the 3 Emissive flat-panel devices- electroluminescent- plasma.docxExplain the 3 Emissive flat-panel devices- electroluminescent- plasma.docx
Explain the 3 Emissive flat-panel devices- electroluminescent- plasma.docxtodd401
 
Experimental Questions 1- Which types of compounds have the strongest.docx
Experimental Questions 1- Which types of compounds have the strongest.docxExperimental Questions 1- Which types of compounds have the strongest.docx
Experimental Questions 1- Which types of compounds have the strongest.docxtodd401
 
Explain how dopants affect the conductivity of a solid- how one can ma.docx
Explain how dopants affect the conductivity of a solid- how one can ma.docxExplain how dopants affect the conductivity of a solid- how one can ma.docx
Explain how dopants affect the conductivity of a solid- how one can ma.docxtodd401
 
explain how revenues and expenditures are classified in the General Fu.docx
explain how revenues and expenditures are classified in the General Fu.docxexplain how revenues and expenditures are classified in the General Fu.docx
explain how revenues and expenditures are classified in the General Fu.docxtodd401
 
Experiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docx
Experiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docxExperiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docx
Experiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docxtodd401
 
Enhance the ButtonViewer program so that it prints the time at which t.docx
Enhance the ButtonViewer program so that it prints the time at which t.docxEnhance the ButtonViewer program so that it prints the time at which t.docx
Enhance the ButtonViewer program so that it prints the time at which t.docxtodd401
 
Explain covalent bond- Explain Metallic bond and what important proper.docx
Explain covalent bond- Explain Metallic bond and what important proper.docxExplain covalent bond- Explain Metallic bond and what important proper.docx
Explain covalent bond- Explain Metallic bond and what important proper.docxtodd401
 
English Read the sentences- Which sentence contains a nonrestrictive.docx
English Read the sentences-  Which sentence contains a nonrestrictive.docxEnglish Read the sentences-  Which sentence contains a nonrestrictive.docx
English Read the sentences- Which sentence contains a nonrestrictive.docxtodd401
 

More from todd401 (20)

Exercise 7-15 During October- Wichita Light Company experiences the fo.docx
Exercise 7-15 During October- Wichita Light Company experiences the fo.docxExercise 7-15 During October- Wichita Light Company experiences the fo.docx
Exercise 7-15 During October- Wichita Light Company experiences the fo.docx
 
Exercise 4-3 (Part Level Submission) The adjusted trial balance column.docx
Exercise 4-3 (Part Level Submission) The adjusted trial balance column.docxExercise 4-3 (Part Level Submission) The adjusted trial balance column.docx
Exercise 4-3 (Part Level Submission) The adjusted trial balance column.docx
 
examples of how being familiar with and following digital forensic bes.docx
examples of how being familiar with and following digital forensic bes.docxexamples of how being familiar with and following digital forensic bes.docx
examples of how being familiar with and following digital forensic bes.docx
 
Est 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docx
Est 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docxEst 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docx
Est 12-16 AM edugen-wileyplus-com Open Assignment t experience please.docx
 
examples of materials that have directional properties as a single cry.docx
examples of materials that have directional properties as a single cry.docxexamples of materials that have directional properties as a single cry.docx
examples of materials that have directional properties as a single cry.docx
 
Examine the importance for business financial leaders to recognize the.docx
Examine the importance for business financial leaders to recognize the.docxExamine the importance for business financial leaders to recognize the.docx
Examine the importance for business financial leaders to recognize the.docx
 
Examine the primary reasons why project management causes a cultural c.docx
Examine the primary reasons why project management causes a cultural c.docxExamine the primary reasons why project management causes a cultural c.docx
Examine the primary reasons why project management causes a cultural c.docx
 
Fal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docx
Fal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docxFal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docx
Fal or - Seawat A pur ture Chapter Review Speaking1- How is a mixture.docx
 
Everything compiles and everything runs correctly except my insertionS.docx
Everything compiles and everything runs correctly except my insertionS.docxEverything compiles and everything runs correctly except my insertionS.docx
Everything compiles and everything runs correctly except my insertionS.docx
 
Explain three advantages and one disadvantage to CONSUMER from standar.docx
Explain three advantages and one disadvantage to CONSUMER from standar.docxExplain three advantages and one disadvantage to CONSUMER from standar.docx
Explain three advantages and one disadvantage to CONSUMER from standar.docx
 
Explain the various reasons why atoms and molecules form chemical bond.docx
Explain the various reasons why atoms and molecules form chemical bond.docxExplain the various reasons why atoms and molecules form chemical bond.docx
Explain the various reasons why atoms and molecules form chemical bond.docx
 
Explain (in your own words) the concept colbertism and what-'s interes.docx
Explain (in your own words) the concept colbertism and what-'s interes.docxExplain (in your own words) the concept colbertism and what-'s interes.docx
Explain (in your own words) the concept colbertism and what-'s interes.docx
 
Explain the 3 Emissive flat-panel devices- electroluminescent- plasma.docx
Explain the 3 Emissive flat-panel devices- electroluminescent- plasma.docxExplain the 3 Emissive flat-panel devices- electroluminescent- plasma.docx
Explain the 3 Emissive flat-panel devices- electroluminescent- plasma.docx
 
Experimental Questions 1- Which types of compounds have the strongest.docx
Experimental Questions 1- Which types of compounds have the strongest.docxExperimental Questions 1- Which types of compounds have the strongest.docx
Experimental Questions 1- Which types of compounds have the strongest.docx
 
Explain how dopants affect the conductivity of a solid- how one can ma.docx
Explain how dopants affect the conductivity of a solid- how one can ma.docxExplain how dopants affect the conductivity of a solid- how one can ma.docx
Explain how dopants affect the conductivity of a solid- how one can ma.docx
 
explain how revenues and expenditures are classified in the General Fu.docx
explain how revenues and expenditures are classified in the General Fu.docxexplain how revenues and expenditures are classified in the General Fu.docx
explain how revenues and expenditures are classified in the General Fu.docx
 
Experiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docx
Experiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docxExperiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docx
Experiment# Kinetics of an Iodine Clock Reaction 1- A color change wil.docx
 
Enhance the ButtonViewer program so that it prints the time at which t.docx
Enhance the ButtonViewer program so that it prints the time at which t.docxEnhance the ButtonViewer program so that it prints the time at which t.docx
Enhance the ButtonViewer program so that it prints the time at which t.docx
 
Explain covalent bond- Explain Metallic bond and what important proper.docx
Explain covalent bond- Explain Metallic bond and what important proper.docxExplain covalent bond- Explain Metallic bond and what important proper.docx
Explain covalent bond- Explain Metallic bond and what important proper.docx
 
English Read the sentences- Which sentence contains a nonrestrictive.docx
English Read the sentences-  Which sentence contains a nonrestrictive.docxEnglish Read the sentences-  Which sentence contains a nonrestrictive.docx
English Read the sentences- Which sentence contains a nonrestrictive.docx
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Explain how SSL protocol is used to ensure the confidentiality and int.docx

  • 1. Explain how SSL protocol is used to ensure the confidentiality and integrity of the Internet traffic. Solution SSL uses a combination of public-key and symmetric-key encryption to secure a connection between two machines, typically a Web or mail server and a client machine, communicating over the Internet or an internal network. Using the OSI reference model as context, SSL runs above the TCP/IP protocol, which is responsible for the transport and routing of data over a network, and below higher-level protocols such as HTTP and IMAP, encrypting the data of network connections in the application layer of the Internet Protocol suite. The "sockets" part of the term refers to the sockets method of passing data back and forth between a client and a server program in a network, or between program layers in the same computer. The Transport Layer Security (TLS) protocol evolved from SSL and has largely superseded it, although the terms SSL or SSL/TLS are still commonly used; SSL is often used to refer to what is actually TLS. The combination of SSL/TLS is the most widely deployed security protocol used today and is found in applications such as Web browsers, email and basically any situation where data needs to be securely exchanged over a network, like file transfers, VPN connections, instant messaging and voice over IP. The SSL protocol includes two sub-protocols: the record protocol and the "handshake" protocol. These protocols allow a client to authenticate a server and establish an encrypted SSL connection. In what's referred to as the "initial handshake process," a server that supports SSL presents its digital certificate to the client to authenticate the server's identity. Server certificates follow the X.509 certificate format that is defined by the Public-Key Cryptography Standards (PKCS). The authentication process uses public-key encryption to validate the digital certificate and confirm that a server is in fact the server it claims to be. Once the server has been authenticated, the client and server establish cipher settings and a shared key to encrypt the information they exchange during the remainder of the session. This provides data confidentiality and integrity. This whole process is invisible to the user. For example, if a webpage requires an SSL connection, the URL will change from HTTP to HTTPS and a padlock icon appears in the browser once the server has been authenticated.
  • 2. The handshake also allows the client to authenticate itself to the server. In this case, after server authentication is successfully completed, the client must present its certificate to the server to authenticate the client's identity before the encrypted SSL session can be established.