Literature Review: SSL and TLS Network Security Protocols
VerifiedAdded on 2022/12/26
|21
|5224
|30
Literature Review
AI Summary
This literature review delves into the SSL and TLS network security protocols, examining various research perspectives on their effectiveness and vulnerabilities. It covers topics such as SDN-based approaches to enhance security, web security enhancements using SSL, and analyses of recent attacks on SSL/TLS protocols. The review also explores TLS usage in Android apps, trust models for improving SSL/TLS, and multicore SSL/TLS security processor architectures. Each study's methodologies, strengths, weaknesses, and open questions are critically analyzed, providing a comprehensive overview of the current state of research in SSL and TLS security.

Running head: NETWORK SECURITY PROTOCOLS SSL AND TLS
Network Security protocols SSL and TLS
Name of the Student
Name of the University
Course code
Author Note:
Network Security protocols SSL and TLS
Name of the Student
Name of the University
Course code
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1NETWORK SECURITY PROTOCOLS SSL AND TLS
Table of Contents
Introduction......................................................................................................................................2
Literature Review of SSL................................................................................................................2
LR 1: An SDN-based approach to enhance the end-to-end security...............................................2
LR 02: Web Security and Enhancement Using SSL.......................................................................4
LR 03: Analysis of Recent Attacks on SSL/TLS Protocols............................................................6
Literature Review of TLS................................................................................................................8
LR 04: Studying TLS usage in Android apps..................................................................................8
LR 05: TSSL: Improving SSL/TLS protocol by trust model........................................................10
LR 06: Multicore SSL/TLS security processor architecture.........................................................12
Conclusion.....................................................................................................................................14
Reference.......................................................................................................................................15
Table of Contents
Introduction......................................................................................................................................2
Literature Review of SSL................................................................................................................2
LR 1: An SDN-based approach to enhance the end-to-end security...............................................2
LR 02: Web Security and Enhancement Using SSL.......................................................................4
LR 03: Analysis of Recent Attacks on SSL/TLS Protocols............................................................6
Literature Review of TLS................................................................................................................8
LR 04: Studying TLS usage in Android apps..................................................................................8
LR 05: TSSL: Improving SSL/TLS protocol by trust model........................................................10
LR 06: Multicore SSL/TLS security processor architecture.........................................................12
Conclusion.....................................................................................................................................14
Reference.......................................................................................................................................15

2NETWORK SECURITY PROTOCOLS SSL AND TLS
Introduction
The notable determination of the report is to focus on different networking security
protocol such as TLS and SSL. The report will be discussing different aspects of these security
protocols from the point of view of different researchers. The effectiveness of the paper will be
maintained with the help of the selected peer-reviewed articles. The following unit of the paper is
the literature review unit where both TLS, as well as SSL, will be discussed.
Literature Review of SSL
LR 1: An SDN-based approach to enhance the end-to-end security
What has already been done on the topic?
Safety and security of online communications are maintained with the help of the
standard security protocol known as the Secure Sockets Layer. The researcher of the paper stated
about the importance of the SSL technology was highlighted by the researchers of the paper.
According to the researcher, the SSL technology is very much effective regarding the
transmission of data between the browsers to the web server (Wang, Dong & Song, 2017). The
advantages, as well as the disadvantages of this technology, was highlighted by the researchers
of the paper. The importance of the Certificate signing request has been provided by the
researcher as well. The paper also highlighted the application of the SSL tools which are used by
the SSL technology.
Who the key researchers are
The researchers of this paper are (Ranjibar et al. 2016).
Introduction
The notable determination of the report is to focus on different networking security
protocol such as TLS and SSL. The report will be discussing different aspects of these security
protocols from the point of view of different researchers. The effectiveness of the paper will be
maintained with the help of the selected peer-reviewed articles. The following unit of the paper is
the literature review unit where both TLS, as well as SSL, will be discussed.
Literature Review of SSL
LR 1: An SDN-based approach to enhance the end-to-end security
What has already been done on the topic?
Safety and security of online communications are maintained with the help of the
standard security protocol known as the Secure Sockets Layer. The researcher of the paper stated
about the importance of the SSL technology was highlighted by the researchers of the paper.
According to the researcher, the SSL technology is very much effective regarding the
transmission of data between the browsers to the web server (Wang, Dong & Song, 2017). The
advantages, as well as the disadvantages of this technology, was highlighted by the researchers
of the paper. The importance of the Certificate signing request has been provided by the
researcher as well. The paper also highlighted the application of the SSL tools which are used by
the SSL technology.
Who the key researchers are
The researchers of this paper are (Ranjibar et al. 2016).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3NETWORK SECURITY PROTOCOLS SSL AND TLS
What approaches and methodologies have been proposed and developed
Investigative approach was considered in this research paper. The data collection
procedure of this paper is the secondary data collection procedure, qualitative data analysis
technique was presented in the paper as well. The probabilistic sampling method is considered in
the paper.
The paper successfully highlighted the importance of the concurrent connections which
are important in most of the SSL connections (Perrin & Brisson, 2017). The paper highlighted
the SSL session establishment which is very important for the readers of this document to
understand the handshake procedure of SSL technology.
What strength and weakness of existing approaches and methodologies area
There are both strengths and benefits associated with the methodologies and approaches
which was discussed in the paper. The flow diagram of the SSL technology which describes the
handshaking procedure of the policy box. The strength and the weakness of the handshaking
procedure have not been provided in the paper. The researcher of the paper have not highlighted
the complexities of the handshaking protocol. The complexities of the mentioned deep packet
devices have not been provided in the paper as well.
The researcher focused on the handshake Renegotiation but have not provided a critical
analysis of this approach. The prototype which was presented in the paper does not argues its
application in other networking security protocols.
What open questions are in this area?
What approaches and methodologies have been proposed and developed
Investigative approach was considered in this research paper. The data collection
procedure of this paper is the secondary data collection procedure, qualitative data analysis
technique was presented in the paper as well. The probabilistic sampling method is considered in
the paper.
The paper successfully highlighted the importance of the concurrent connections which
are important in most of the SSL connections (Perrin & Brisson, 2017). The paper highlighted
the SSL session establishment which is very important for the readers of this document to
understand the handshake procedure of SSL technology.
What strength and weakness of existing approaches and methodologies area
There are both strengths and benefits associated with the methodologies and approaches
which was discussed in the paper. The flow diagram of the SSL technology which describes the
handshaking procedure of the policy box. The strength and the weakness of the handshaking
procedure have not been provided in the paper. The researcher of the paper have not highlighted
the complexities of the handshaking protocol. The complexities of the mentioned deep packet
devices have not been provided in the paper as well.
The researcher focused on the handshake Renegotiation but have not provided a critical
analysis of this approach. The prototype which was presented in the paper does not argues its
application in other networking security protocols.
What open questions are in this area?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4NETWORK SECURITY PROTOCOLS SSL AND TLS
The open question of this paper is the usability of the prototype presented in the paper
with the help of the OpenDay light controller. The increasing latency issues of SSL technology
was highlighted in the paper as well. Thus the usability of SSL is the main open question of this
paper.
LR 02: Web Security and Enhancement Using SSL
What has already been done on the topic?
The researcher of the paper discussed the use of the encryption algorithm techniques in
the application of SSL technology in the data communication procedure. The need for
maintaining the SSL certificates has been provided in the paper. The encryption algorithms
which are needed to scramble the data in transmit has been provided in the paper as well
(Alghamdi et al., 2018). The researcher of the paper stated that SSL can be very much important
to prevent the hacking issues of data transmission. The researcher of the paper focuses on the
creation of the SSL connection which is important in the encryption process of the SSL
technology.
Who the key researchers are
The chief researchers of the paper are Singh and Loar (2018).
What approaches and methodologies have been proposed and developed
The research methodology of this paper is very reliable as it considers the opinion of the
other researcher. The data analysis of the paper is qualitative data analysis. The sampling method
which was selected in this paper is non-probabilistic sampling method as it does not have any
numerical considerations.
The open question of this paper is the usability of the prototype presented in the paper
with the help of the OpenDay light controller. The increasing latency issues of SSL technology
was highlighted in the paper as well. Thus the usability of SSL is the main open question of this
paper.
LR 02: Web Security and Enhancement Using SSL
What has already been done on the topic?
The researcher of the paper discussed the use of the encryption algorithm techniques in
the application of SSL technology in the data communication procedure. The need for
maintaining the SSL certificates has been provided in the paper. The encryption algorithms
which are needed to scramble the data in transmit has been provided in the paper as well
(Alghamdi et al., 2018). The researcher of the paper stated that SSL can be very much important
to prevent the hacking issues of data transmission. The researcher of the paper focuses on the
creation of the SSL connection which is important in the encryption process of the SSL
technology.
Who the key researchers are
The chief researchers of the paper are Singh and Loar (2018).
What approaches and methodologies have been proposed and developed
The research methodology of this paper is very reliable as it considers the opinion of the
other researcher. The data analysis of the paper is qualitative data analysis. The sampling method
which was selected in this paper is non-probabilistic sampling method as it does not have any
numerical considerations.

5NETWORK SECURITY PROTOCOLS SSL AND TLS
The security issues of the SSL technology was presented in the paper in a detailed
manner. The researcher stated that loss of confidentiality which is a very much contributing
factor of SSL technology. The main approach of the SSL was presented in the paper in a well-
organized manner. The paper is very much important to understand the reliability of the SSL
technology in terms of the recent cybersecurity issue such as ransomeware.
What strength and weakness of existing approaches and methodologies area
There is a significant weakness regarding the data collection procedure of this paper
which is that it does not provide a case study to support the discussions of the paper. However,
the procedure of the implementation of the SSL certificate is the main attraction of the paper
(Asadzadeh Kaljahi, Payandeh & Ghaznavi‐Ghoushchi, 2015). The paper helps in identifying
insights of SSL in terms of the use of two different types of keys such as the symmetric key
encryption and public key encryption.
The main challenges of the SSL technology was stated in the paper however, detailed
explanation of those challenges was presented in the paper as well. The discussions of the paper
was not supported by clear evidences in the form of case study which highlights the weakness of
approach adopted by the researchers.
What open questions are in this area?
Effectiveness of the performance intensive operations is the prime question of SSL
technology. The researcher of the paper discussed SSL technology from numerous perspectives
which raises a main question which is the determination of the vulnerabilities associated with the
SSL technology. The researcher of the paper stated the importance of the security goals which
are needed to be maintained in the data communication procedure.
The security issues of the SSL technology was presented in the paper in a detailed
manner. The researcher stated that loss of confidentiality which is a very much contributing
factor of SSL technology. The main approach of the SSL was presented in the paper in a well-
organized manner. The paper is very much important to understand the reliability of the SSL
technology in terms of the recent cybersecurity issue such as ransomeware.
What strength and weakness of existing approaches and methodologies area
There is a significant weakness regarding the data collection procedure of this paper
which is that it does not provide a case study to support the discussions of the paper. However,
the procedure of the implementation of the SSL certificate is the main attraction of the paper
(Asadzadeh Kaljahi, Payandeh & Ghaznavi‐Ghoushchi, 2015). The paper helps in identifying
insights of SSL in terms of the use of two different types of keys such as the symmetric key
encryption and public key encryption.
The main challenges of the SSL technology was stated in the paper however, detailed
explanation of those challenges was presented in the paper as well. The discussions of the paper
was not supported by clear evidences in the form of case study which highlights the weakness of
approach adopted by the researchers.
What open questions are in this area?
Effectiveness of the performance intensive operations is the prime question of SSL
technology. The researcher of the paper discussed SSL technology from numerous perspectives
which raises a main question which is the determination of the vulnerabilities associated with the
SSL technology. The researcher of the paper stated the importance of the security goals which
are needed to be maintained in the data communication procedure.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6NETWORK SECURITY PROTOCOLS SSL AND TLS
The open questions of the paper are the probable cybersecurity techniques which are in
terms of the practical implementation of the SSL technology in terms of its application in our
society as well as in business organization. The protocols of the SSL technology is also
questionable as it is very much difficult for the non0technical persons to understand the complex
protocols of SSL technology.
LR 03: Analysis of Recent Attacks on SSL/TLS Protocols
What has already been done on the topic?
The cryptographic procedures of the SSL technology was provided in the paper as well.
The paper was very much important to understand the cryptographic algorithms which are used
in the application of SSL technology. The incorporation of different categories of hash functions
which are considered in the SSL technology has been discussed by the researcher of this source
as well. The concepts of hash-based message authentication technique has been provided in the
paper as well. The key exchange mechanisms was discussed in the paper from different
perspectives such as Diffie-Hellman key exchange (C.E and P.A, 2018). Different aspects of
Diffie-Hellman key exchange was discussed in the paper as well. The paper highlighted the
certification based protocols of SSL technology. The importance of the SSL communications is
presented in the paper in a professional manner which helps in identifying the reason behind the
security attacks of SSL technology.
Who the key researchers are
The prime researcher of the paper are DUYGU et al. (2016).
What approaches and methodologies have been proposed and developed
The open questions of the paper are the probable cybersecurity techniques which are in
terms of the practical implementation of the SSL technology in terms of its application in our
society as well as in business organization. The protocols of the SSL technology is also
questionable as it is very much difficult for the non0technical persons to understand the complex
protocols of SSL technology.
LR 03: Analysis of Recent Attacks on SSL/TLS Protocols
What has already been done on the topic?
The cryptographic procedures of the SSL technology was provided in the paper as well.
The paper was very much important to understand the cryptographic algorithms which are used
in the application of SSL technology. The incorporation of different categories of hash functions
which are considered in the SSL technology has been discussed by the researcher of this source
as well. The concepts of hash-based message authentication technique has been provided in the
paper as well. The key exchange mechanisms was discussed in the paper from different
perspectives such as Diffie-Hellman key exchange (C.E and P.A, 2018). Different aspects of
Diffie-Hellman key exchange was discussed in the paper as well. The paper highlighted the
certification based protocols of SSL technology. The importance of the SSL communications is
presented in the paper in a professional manner which helps in identifying the reason behind the
security attacks of SSL technology.
Who the key researchers are
The prime researcher of the paper are DUYGU et al. (2016).
What approaches and methodologies have been proposed and developed
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7NETWORK SECURITY PROTOCOLS SSL AND TLS
Reliable sources were used as the data collection procedure of the paper. The data
analysis of this paper is qualitative data collection as data are collected only from secondary
sources. The research philosophy of the paper is positivism, at the same time it can be said that
the sampling procedure of the paper is non-probabilistic.
The researcher of the paper highlighted the security preliminaries associate with the SSL
technology. The certified based protocols of the SSL technology was highlighted in the paper
(Caldas-Calle et al., 2017). The recent security attacks on the SSL technology was provided in
the paper as well.
The researcher of the paper discussed the detailed explanation of the cryptosystems
which are discussed in SSL such as the RSA algorithm and asymmetric cryptography (de
Fuentes, Hernandez-Encinas & Ribagorda, 2018). Concepts of key generation, as well as
encryption procedures, was explained in the paper in a well-defined manner.
The researcher of the paper stated that the key size of the bits are completely different
from algorithms such as the RSA algorithm in a tabular form. The importance of the stream
cipher in SSL technology was highlighted in the paper as well (De Ruiter & Poll, 2015). Along
with that the researcher of the paper stated about the use of the secure hash functions such as
SHA 1 in SSL technology. The importance of the Public Key Infrastructure (PKI) in the SSL
technology is presented in the paper as well.
What strength and weakness of existing approaches and methodologies are?
The prime strength of the paper is that it focuses on different types of security threats of
the SSL technology, however, the paper does not provided a case studies regarding the flaw if
the system which helped the social engineers to conduct this security attack. However, along
Reliable sources were used as the data collection procedure of the paper. The data
analysis of this paper is qualitative data collection as data are collected only from secondary
sources. The research philosophy of the paper is positivism, at the same time it can be said that
the sampling procedure of the paper is non-probabilistic.
The researcher of the paper highlighted the security preliminaries associate with the SSL
technology. The certified based protocols of the SSL technology was highlighted in the paper
(Caldas-Calle et al., 2017). The recent security attacks on the SSL technology was provided in
the paper as well.
The researcher of the paper discussed the detailed explanation of the cryptosystems
which are discussed in SSL such as the RSA algorithm and asymmetric cryptography (de
Fuentes, Hernandez-Encinas & Ribagorda, 2018). Concepts of key generation, as well as
encryption procedures, was explained in the paper in a well-defined manner.
The researcher of the paper stated that the key size of the bits are completely different
from algorithms such as the RSA algorithm in a tabular form. The importance of the stream
cipher in SSL technology was highlighted in the paper as well (De Ruiter & Poll, 2015). Along
with that the researcher of the paper stated about the use of the secure hash functions such as
SHA 1 in SSL technology. The importance of the Public Key Infrastructure (PKI) in the SSL
technology is presented in the paper as well.
What strength and weakness of existing approaches and methodologies are?
The prime strength of the paper is that it focuses on different types of security threats of
the SSL technology, however, the paper does not provided a case studies regarding the flaw if
the system which helped the social engineers to conduct this security attack. However, along

8NETWORK SECURITY PROTOCOLS SSL AND TLS
with the strength, it can also be said that this paper has not successfully identified the mitigation
procedure of each of the security attacks (Garcia-Alfaro, Kranakis & Bonfante, 2016). The other
limitation of the paper is that it does not provided a detailed explanation of the security threats
such as the RSA based timing attacks. The weakness of the paper is the lack of critical analysis
of the triple handshake process 1 and 2 (Ding & Li, 2016). The other weakness of the paper is
that it fails to focuses on most of the Drown attack which occurred in the year 2016.
What open questions are in this area?
The open questions of the paper revolves around the different categories of security
attacks such as the logical flaws of the protocols, flaws in the design of this technology, flaws in
the cryptographic designs, flaw in the implementation of the technology in a private network.
The issues arising with the configuration of the SSL along with the infrastructure of the SSL are
the other open questions raised by the researchers of the paper.
Literature Review of TLS
LR 04: Studying TLS usage in Android apps
What has already been done on the topic?
The researcher of the paper stated that TLS protocol cab be very much important for
most of the internet communications as well as the online transactions considering payment
gateways such as PayPal. The researcher of the paper stated about the importance of the TLS
which are increasingly used in most of the smart phones. The researcher of the paper mentioned
that the application of the TLS is very much important to prevent numerous issues such as
with the strength, it can also be said that this paper has not successfully identified the mitigation
procedure of each of the security attacks (Garcia-Alfaro, Kranakis & Bonfante, 2016). The other
limitation of the paper is that it does not provided a detailed explanation of the security threats
such as the RSA based timing attacks. The weakness of the paper is the lack of critical analysis
of the triple handshake process 1 and 2 (Ding & Li, 2016). The other weakness of the paper is
that it fails to focuses on most of the Drown attack which occurred in the year 2016.
What open questions are in this area?
The open questions of the paper revolves around the different categories of security
attacks such as the logical flaws of the protocols, flaws in the design of this technology, flaws in
the cryptographic designs, flaw in the implementation of the technology in a private network.
The issues arising with the configuration of the SSL along with the infrastructure of the SSL are
the other open questions raised by the researchers of the paper.
Literature Review of TLS
LR 04: Studying TLS usage in Android apps
What has already been done on the topic?
The researcher of the paper stated that TLS protocol cab be very much important for
most of the internet communications as well as the online transactions considering payment
gateways such as PayPal. The researcher of the paper stated about the importance of the TLS
which are increasingly used in most of the smart phones. The researcher of the paper mentioned
that the application of the TLS is very much important to prevent numerous issues such as
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9NETWORK SECURITY PROTOCOLS SSL AND TLS
eavesdropping, tampering and message forgery (Guo et al., 2016). The researcher of the paper
also highlighted the difference between SSL and TLS. The application of the encryption
procedure was succeeded in the paper as well. The paper was very much helpful to understand
the cryptographic protocols of TLS.
Who the key researchers are?
The researchers of the paper are Razaghpanah et al. (2018)
What approaches and methodologies have been proposed and developed?
The data collection procedure of the paper is very much reliable as it considered only the
peer-reviewed articles. The data collection procedure of the paper is matched with the data
analysis procedure which is the qualitative data analysis (Heđi, Špeh & Šarabok, 2017). The
sampling technique of the paper is non-probabilistic sampling technique as there are no such
numerical assumptions associated with the data collection procedure of the paper.
A well-structured approaches is followed by the researchers of the paper. The concepts of
Lumen overview and data overview are introduced in the initial stages of the paper (Karagiannis
et al., 2015). It can be also said that concepts such as the cent side handshake of the TLS is
presented in a structured way in the paper. The configurations, as well as the vulnerabilities of
the TLS, was presented in the paper as well.
What strength and weakness of existing approaches and methodologies are?
eavesdropping, tampering and message forgery (Guo et al., 2016). The researcher of the paper
also highlighted the difference between SSL and TLS. The application of the encryption
procedure was succeeded in the paper as well. The paper was very much helpful to understand
the cryptographic protocols of TLS.
Who the key researchers are?
The researchers of the paper are Razaghpanah et al. (2018)
What approaches and methodologies have been proposed and developed?
The data collection procedure of the paper is very much reliable as it considered only the
peer-reviewed articles. The data collection procedure of the paper is matched with the data
analysis procedure which is the qualitative data analysis (Heđi, Špeh & Šarabok, 2017). The
sampling technique of the paper is non-probabilistic sampling technique as there are no such
numerical assumptions associated with the data collection procedure of the paper.
A well-structured approaches is followed by the researchers of the paper. The concepts of
Lumen overview and data overview are introduced in the initial stages of the paper (Karagiannis
et al., 2015). It can be also said that concepts such as the cent side handshake of the TLS is
presented in a structured way in the paper. The configurations, as well as the vulnerabilities of
the TLS, was presented in the paper as well.
What strength and weakness of existing approaches and methodologies are?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10NETWORK SECURITY PROTOCOLS SSL AND TLS
There are numerous weakness and strength associated in this paper. The most significant
approach of the paper can be highly criticized. The security protocols of TLS technology can be
very much important for most of the users of this technology. The strength of the paper is that it
helps in focusing on mobile security of TLS (Keerthi, 2016). The other important aspect of this
paper is that it helps in understanding the background of android and TLS. The application of the
TLS in the android devices is the most significant contribution of the paper. The capturing of the
TLS traffic is also the chief contribution of the paper.
The lack of critical analysis is the significant limitation of the paper, along with that there
are other limitations of the paper as well in terms of the lack of graphical representations of the
findings of the paper. The other constraint associated with this paper is the data collection
procedure as the primary as well as the secondary data collection procedure could have enhanced
the efficiency of the paper (Li et al., 2017). The concept of client-side handshake analysis which
was scripted in the paper was needed to be represented with the help of graphical representations
[8]. The paper failed to highlight the compatibility issues of the OS API’s as well as the TLS
library.
What open questions are in this area?
The most significant question of the paper is that it helps in understanding the importance
of managing the traffic statistics of the communications platforms. The open questions of the
paper is regarding the ethical considerations of the use of TLS technology (Lindström & Pap,
2017). The other open questions of the paper is that it helps in understanding the importance of
meta-data in most of the android applications.
There are numerous weakness and strength associated in this paper. The most significant
approach of the paper can be highly criticized. The security protocols of TLS technology can be
very much important for most of the users of this technology. The strength of the paper is that it
helps in focusing on mobile security of TLS (Keerthi, 2016). The other important aspect of this
paper is that it helps in understanding the background of android and TLS. The application of the
TLS in the android devices is the most significant contribution of the paper. The capturing of the
TLS traffic is also the chief contribution of the paper.
The lack of critical analysis is the significant limitation of the paper, along with that there
are other limitations of the paper as well in terms of the lack of graphical representations of the
findings of the paper. The other constraint associated with this paper is the data collection
procedure as the primary as well as the secondary data collection procedure could have enhanced
the efficiency of the paper (Li et al., 2017). The concept of client-side handshake analysis which
was scripted in the paper was needed to be represented with the help of graphical representations
[8]. The paper failed to highlight the compatibility issues of the OS API’s as well as the TLS
library.
What open questions are in this area?
The most significant question of the paper is that it helps in understanding the importance
of managing the traffic statistics of the communications platforms. The open questions of the
paper is regarding the ethical considerations of the use of TLS technology (Lindström & Pap,
2017). The other open questions of the paper is that it helps in understanding the importance of
meta-data in most of the android applications.

11NETWORK SECURITY PROTOCOLS SSL AND TLS
LR 05: TSSL: Improving SSL/TLS protocol by trust model
What has already been done on the topic?
The researcher of the paper stated that TLS technology is the most important security
protocol of the transport layer. The issues of TLS in terms of CIA was stated in the paper as well
by the researcher (Nastase, 2017). The researcher of the paper also highlighted the trust model
associated with the SSL technology. The researcher of the paper already discussed the different
malicious server attacks which are increasing in every passing day.
Who the key researchers are?
The researchers of the paper are Asadzadeh Kaljahi, Payandeh, and Ghaznavi‐Ghoushchi
2015)
What approaches and methodologies have been proposed and developed?
The data collection procedures which were followed in the paper is secondary data
collection, where data are collected from reliable secondary resources. It can be said that the data
analysis procedure of the paper is qualitative data analysis. It can be said that the sampling
method which was chosen for this paper is non-probabilistic sampling method. It can be also said
that the effectiveness of the paper will be maintained with the help of the methodology of the
paper.
A huge professional approach was maintained by the researcher as they discussed the
drawbacks of TLS. The over view of the TLS technology was presented in the paper in a
LR 05: TSSL: Improving SSL/TLS protocol by trust model
What has already been done on the topic?
The researcher of the paper stated that TLS technology is the most important security
protocol of the transport layer. The issues of TLS in terms of CIA was stated in the paper as well
by the researcher (Nastase, 2017). The researcher of the paper also highlighted the trust model
associated with the SSL technology. The researcher of the paper already discussed the different
malicious server attacks which are increasing in every passing day.
Who the key researchers are?
The researchers of the paper are Asadzadeh Kaljahi, Payandeh, and Ghaznavi‐Ghoushchi
2015)
What approaches and methodologies have been proposed and developed?
The data collection procedures which were followed in the paper is secondary data
collection, where data are collected from reliable secondary resources. It can be said that the data
analysis procedure of the paper is qualitative data analysis. It can be said that the sampling
method which was chosen for this paper is non-probabilistic sampling method. It can be also said
that the effectiveness of the paper will be maintained with the help of the methodology of the
paper.
A huge professional approach was maintained by the researcher as they discussed the
drawbacks of TLS. The over view of the TLS technology was presented in the paper in a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




