Protocols
Cryptographic algorithms are ephemeral—their useful life span is measured in years, rarely decades. Because of the constantly changing list of reliable cryptographic algorithms and also because it makes good engineering sense, the first thing that needs to be done when deciding to use cryptography is to agree between sender and recipient on a choice of cryptographic algorithm, and to exchange keying information where necessary. This process of agreement prior to exchange is defined in a “protocol” specification—just as in real life, a protocol is the set of agreed upon rules by which work is done, rather than the doing of the work itself.
SSL/TLS
Secure Socket Layer (SSL) and Transport Layer Security (TLS) refer to essentially the ...
Get Eleventh Hour Security+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.