Tuesday, May 7, 2019
Computer networking and management Essay Example | Topics and Well Written Essays - 6500 words
Computer networking and management - Essay spokespersonThe protocol constitutes two layers one is the TLS infix protocol and the other is TLS handshake protocol.Netgear (2005) further discusses that TLS Record Protocol is a layered protocol. There are different contents for messages at all(prenominal) layer messages may contain fields for length or details about the message. Record Protocol performs a series of meshs takes the data/message which is desired to be transmitted to the other end, divides the data into smaller blocks, performs the compression function on the data if needed, applies a MAC and encrypts the message according to it and whence finally transmits the result. The data which is acquire at the target server is decrypted, then verified if it has come from the expected host, decompressed and finally passed onto the target host. TLS Record has two main properties, which are discussed belowConnection between the two communicating entities is private. The techni que that is apply for data encryption is symmetric cryptography. The connection is secure because the key for this symmetric cryptography is unique for every connection, which is communicated between the two connecting applications by another protocol- TLS shingle Protocol. If security of the connection can be compromised then it is possible to utilize the Record Protocol without encryption.Another characteristic about the protocol is that it provides a true(p) connection this is possible due to the provision of a message integrity check which works on a keyed MAC. The security of MAC is ensured by computing it with a secure hash functions.TLS Handshake Protocol gives a medium for the client and server to authenticate each other and to decide an encryption algorithm. Cryptographic keys are also negotiated among the two applications before any data is transferred or received by either. The steps for TLS handshake protocol are defined in the figure belowThe negotiation passage of the encryption algorithm is also secure therefore
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.