SSL protocol is the network security protocol first adopted by Netscape; it is a security protocol implemented on the transmission communication protocol (TCP/IP), using public key technology; SSL widely supports various types of The network simultaneously provides three basic security services, all of which use public key technology.
#The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
What is the SSL protocol?
SSL (Secure Socket Layer) is the network security protocol first adopted by Netscape. It is a security protocol implemented on the Transport Communication Protocol (TCP/IP), using public key technology. SSL widely supports various types of networks and provides three basic security services, all of which use public key technology.
Advantages
The advantage of the SSL protocol is that it is independent of the application layer protocol. High-level application layer protocols (such as HTTP, FTP, Telnet, etc.) can be transparently built on the SSL protocol. The SSL protocol has completed the encryption algorithm, communication key negotiation and server authentication before application layer protocol communication. After this, the data transmitted by the application layer protocol will be encrypted to ensure the privacy of communication.
Security Service
(1) Information confidentiality, through the use of public key and symmetric key technology to achieve information confidentiality. All traffic between the SSL client and server is encrypted using the keys and algorithms established during the SSL handshake. This prevents some users from illegal eavesdropping through the use of IP packet sniffing tools. While packet sniffing can still capture the content of the communication, it cannot decipher it.
(2) Information integrity to ensure that all SSL services achieve their goals. The information content between the server and client should be protected from corruption. SSL utilizes secret sharing and hash function sets to provide information integrity services.
(3) Two-way authentication, the process in which the client and server identify each other. Their identification numbers are encoded with a public key, and their identification numbers are exchanged during the SSL handshake. In order to verify that the certificate holder is its legitimate user (and not an imposter), SSL requires the certificate holder to digitally identify the data exchanged during the handshake. The certificate holder identifies all information data including the certificate to prove that he is the legal owner of the certificate. This prevents other users from using the certificate impersonator. The proof itself does not provide authentication, only the proof and the key work together.
(4) SSL security services should be as transparent as possible to end users. Typically, users only need to click a button or connection on the desktop to connect to an SSL host. Unlike standard HTTP connection requests, the default port for a typical network host that supports SSL to accept SSL connections is 443, not 80.
For more related knowledge, please visit the
FAQThe above is the detailed content of What is SSL protocol. For more information, please follow other related articles on the PHP Chinese website!