SSL Certificate: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[[Image:UnderConstruction.png]] | [[Image:UnderConstruction.png]] | ||
'''SSL''' is the acronym for '''Secure Sockets Layer.''' It | '''SSL''' is the acronym for '''Secure Sockets Layer.''' It was designed to use applications that will allow users to securely send and receive data over the internet. SSL was developed by [[Netscape]] in 1994. The technology uses two protocols, the '''record protocol''' and '''handshake protocol''' to provide security between communicating applications (client and server). <ref>[http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=/rzain/rzainhistory.htm IBM HIstory of SSL]</ref> The technology is integrated in web browsers e-mail and instant messaging applications and other programs with encryption key given by a Certification Authority in the form of a digital certificate. The digital key is authenticated by the handshake protocol in one or both end points during the SSL connection. The handshake protocol will then set-up a unique symmetric key to generate keys that will encrypt and decrypt data to maintain a secure communications and data transfers between computers during SSL session.<ref>[http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=/rzain/rzainhistory.htm How SSL Works]</ref> | ||
==References== | ==References== |
Revision as of 17:54, 2 November 2011
SSL is the acronym for Secure Sockets Layer. It was designed to use applications that will allow users to securely send and receive data over the internet. SSL was developed by Netscape in 1994. The technology uses two protocols, the record protocol and handshake protocol to provide security between communicating applications (client and server). [1] The technology is integrated in web browsers e-mail and instant messaging applications and other programs with encryption key given by a Certification Authority in the form of a digital certificate. The digital key is authenticated by the handshake protocol in one or both end points during the SSL connection. The handshake protocol will then set-up a unique symmetric key to generate keys that will encrypt and decrypt data to maintain a secure communications and data transfers between computers during SSL session.[2]