Secure Socket Layer Implementations-A Review
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in between the application layer protocol (e.g., HTTPS (Hyper Text Transfer Protocol Secure)) and the Transport layer protocol. The http application interfaces with SSL nearly in the same way as it would with TCP in the absence of security. As far as TCP is concerned, SSL is just another application protocol using its services.SSL consist of two sub-protocols, the Hand-shake protocol and Record protocol. The strength of the SSL and hence the performance offered by the secure communication is determined by the selection of the cipher suite. The cipher suite itself has got four components and they are technique for key exchange, authentication, encryption and the method to compute the message digest hash. Different methods are available for all the above said technique and we need to select a cipher suite that will perfectly match our performance requirements, speed and memory constraint. Different built in libraries are there for the developers to use. This paper provides a brief comparison and description regarding the most commonly used SSL implementations such as OpenSSL, CyaSSL and MatrixSSL.
Authors and Affiliations
Alphonsa Johny , Dr. Jayasudha J. S
An improved load balancing adaptive QoS buffer scheduler (I-LABS) for streaming services over MANET
Large variations in network Quality of Service (QoS) in terms of bandwidth, latency, jitter may occur during media transfer over Mobile Ad-hoc Networks (MANETs). Researchers have identified that complex computing applica...
An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks
Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components . Thus , the planning of mobile components , i.e. , however they traverse through the sensing field and...
A GENERIC APPROACH TO USER INTERFACE CODE CONVERSION
In a software development lifecycle, there are numerous steps involved in the web page design process, and the GUI has a certain importance in today’s applications. There are various web design technologies available for...
Li-Fi - The Future of Internet
Wireless network has now become the most common form of internet. The use of wireless internet either at home or public places can sometimes lead to slow internet speed and increased processing time as more than one devi...
Enhanced Double Layer Security using RSA over DNA based Data Encryption System
In this paper we propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here we propose techniques that us...