logo

SSL-TLS VPN Technologies

7 Pages1448 Words24 Views
   

Added on  2023-01-11

About This Document

This report discusses SSL communication, including integrity and confidentiality, the role of hash algorithm and symmetric encryption, VPN client software options, mitigating anti-replay attacks, and ways to protect against SSL attacks.

SSL-TLS VPN Technologies

   Added on 2023-01-11

ShareRelated Documents
SSL-TLS VPN
Technologies
Table of Contents
SSL-TLS VPN Technologies_1
Introduction......................................................................................................................................3
Part C...............................................................................................................................................3
Analyse ways in which integrity and confidentiality is attained in SSL communication......3
Explicate role of hash algorithm and symmetric encryption in SSL communication............3
Illustrate VPN client software options...................................................................................5
Part D...............................................................................................................................................5
How anti-replay attacks can be mitigated within SSL communication.................................5
Ways to protect firm against SSL attacks...............................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
SSL-TLS VPN Technologies_2
Introduction
The network which is liable for creating safe, encrypted connection on less secured
network like public internet is referred to as VPN (virtual private network). It makes use of
tunnelling protocols for encryption (Aung and Thein, 2020). Secured socket layer (SSL) implies
standard technology that is utilised for keeping internet connection secured when any kind of
sensitive data is being transmitted among two systems for preventing criminals from having
access it. This report comprises of aspects relate with confidentiality, integrity along with anti
replay.
Part C
Analyse ways in which integrity and confidentiality is attained in SSL communication
Secured socket layer is secured session key foundation as well as symmetric key based
activity privacy. Confidentiality within SSL can be attained via aggregation of both the keys i.e.
symmetric and asymmetric encryption that is liable for making sure that complete privacy of
message is being shared. While the process of SSL is being carried out both server as well as
client agree on algorithm encryption which has to be used and share secret key which has to be
used for one session only (Thaseen, Poorva and Ushasree, 2020). The algorithm along with
agreed key will be liable for managing confidentiality of data that is transmitted among SSL and
clients by ensuring that message is not decrypted even in case if it has been intercepted via a
intruder or third person. This also denotes that integrity of text is maintained as intruder is not
able to decrypt the message that implies they can modify or alter it. The added advantage that is
being offered by SSL is that with data confidentiality is that key distribution issues do not occur
as asymmetric algorithms are being used while transmission of secret key. To identify cipher
suite which can be used, the supported cipher suites are being identified and from them weak
ciphers are eradicated to ensure that adequate cipher is being used.
Explicate role of hash algorithm and symmetric encryption in SSL communication
Symmetric encryption is liable for entailing shared secret key encryption. Within such
kind of encryption, a single key is key is utilised for encrypting as well decrypting the messages
(Owada and et. al, 2019). Here, encryption is quick along with this complexity is low which
facilitates secured socket layer protection.
SSL-TLS VPN Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hybrid Encryption
|4
|798
|8

Cryptography and Security Protocols for Data Protection - Desklib
|6
|1420
|320

Information Security Question Answer 2022
|6
|875
|10

Questions & Answers on Symmetric Block Cipher and Encryption Process
|12
|2956
|64

Application of SSL/VPN
|11
|2172
|1

Virtual Private Networks: Ensuring Security and Integrity of Data
|12
|2219
|342