Thursday, January 23, 2020

Word of the Day: Transport Layer Security

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | January 23, 2019
Transport Layer Security

Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating computer applications.

 

TLS is the most widely-deployed security protocol in use today. It is used by HTTPS to encrypt streams of network traffic between clients and servers and by SMTP Secure (SMTPS) to encrypt message exchanges between clients and servers.

TLS evolved from Netscape's Secure Sockets Layer (SSL) protocol and has largely superseded it, although the terms SSL or SSL/TLS are still sometimes used. Key differences between SSL and TLS that make TLS a more secure and efficient protocol include message authentication, key material generation and cipher suites with newer, more secure algorithms. TLS and SSL are not interoperable, although TLS currently provides some backward compatibility in order to work with legacy systems.

Finalized in 2018, TLS 1.3 is the current version of the protocol. TLS 1.3 was developed to address various vulnerabilities that have been exposed over the past few years, reduce the chance of implementation errors, and remove features no longer needed. For example, MD5 cryptographic hashes are no longer supported, perfect forward secrecy is required and RC4 negotiation is prohibited in TLS 1.3. Continue reading...

TLS Takeaway

 

"Transport Layer Security -- the successor to Secure Sockets Layer -- is designed to provide an encrypted channel between two hosts. It has measures built into it to help both parties know if someone is trying to alter, snoop, interfere with, tamper with or otherwise gain access to the communications." - Ed Moyle

TLS in the News

 

Netgear under fire after TLS certificates found in firmware -- again
Netgear plans to release firmware hotfixes for all affected routers as soon as possible.

How to encrypt and secure a website using HTTPS
Learn how running HTTP over the Transport Layer Security (TLS) protocol grew up to become HTTPS.

HTTPS interception gets a bad rap; now what?
Learn why a new study by U.S.-CERT warns against. intercepting TLS connections to gain visibility into network traffic.

Beware of security blind spots in encrypted traffic
Learn why gaining visibility into corporate networks is key to fending off cyber attacks hiddenn by SSL and TLS encryption protocols.

Today's Tech Trivia

 

What do you call an algorithm used to encrypt and decrypt data?


a. cipher
b. bit mask

Click on this link to see the answer!


Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: