Monday, June 17, 2019

Computer networking and management Essay Example | Topics and Well Written Essays - 6500 words

Computer networking and management - Essay ExampleThe protocol constitutes two layers adept is the TLS file Protocol and the other is TLS handshake protocol.Netgear (2005) further discusses that TLS Record Protocol is a layered protocol. There argon different contents for messages at every(prenominal) layer messages may contain fields for length or details about the message. Record Protocol performs a series of functions takes the data/message which is sought after to be transmitted to the other end, divides the data into smaller blocks, performs the compression function on the data if needed, applies a MAC and encrypts the message according to it and then at last transmits the result. The data which is received at the target server is decrypted, then verified if it has come from the expected host, decompressed and finally passed onto the target host. TLS Record has two main properties, which are discussed belowConnection between the two communicating entities is private. The te chnique that is used for data encryption is symmetric cryptograph. The connection is secure because the key for this symmetric cryptography is unique for every connection, which is communicated between the two connecting applications by another protocol- TLS Handshake Protocol. If security of the connection can be compromised then it is possible to utilize the Record Protocol without encryption.Another characteristic about the protocol is that it provides a reliable connection this is possible due to the provision of a message integrity insure which works on a keyed MAC. The security of MAC is ensured by computing it with a secure hash functions.TLS Handshake Protocol gives a mass medium for the client and server to authenticate each other and to decide an encryption algorithm. Cryptographic keys are similarly negotiated among the two applications before any data is transferred or received by either. The steps for TLS handshake protocol are defined in the figure belowThe negotia tion process of the encryption algorithm is also secure therefore

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.