Secure Socket Layer Implementations-A Review

Abstract

Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in between the application layer protocol (e.g., HTTPS (Hyper Text Transfer Protocol Secure)) and the Transport layer protocol. The http application interfaces with SSL nearly in the same way as it would with TCP in the absence of security. As far as TCP is concerned, SSL is just another application protocol using its services.SSL consist of two sub-protocols, the Hand-shake protocol and Record protocol. The strength of the SSL and hence the performance offered by the secure communication is determined by the selection of the cipher suite. The cipher suite itself has got four components and they are technique for key exchange, authentication, encryption and the method to compute the message digest hash. Different methods are available for all the above said technique and we need to select a cipher suite that will perfectly match our performance requirements, speed and memory constraint. Different built in libraries are there for the developers to use. This paper provides a brief comparison and description regarding the most commonly used SSL implementations such as OpenSSL, CyaSSL and MatrixSSL.

Authors and Affiliations

Alphonsa Johny , Dr. Jayasudha J. S

Keywords

Related Articles

A Survey on Underwater Sensor Network Architecture and Protocols

Underwater sensor networks (UWSNs) are becoming popular everyday due to their ability which makes them to be deployed under adverse environmental conditions. UWNs are the enabling technology for wide range of application...

A SURVEY ON ANT COLONY OPTIMIZATION

This paper deals with Ant Colony Optimization, a heuristic algorithm with strong robustness and the ability of finding the optimal solution which has been applied to a number of combinatorial optimization (CO) problems,...

FACE RECOGNITION SYSTEM BASED ON 2DFLD AND PCA

An automated system is used for fast human face recognition. The 2DFLD algorithm is tested on the various databases. PCA algorithm is tested on various databases. As the face system is totally nonintrusive, existing secu...

COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING

Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...

Automatic Segmentation of Punjabi Speech into Syllable-Like Units using Group Delay A Review

The basic building blocks of a speech segmentation system are its units. Thus it’s an important stage to select appropriate units into which the continuous speech needs to be segmented. The syllable like units is found t...

Download PDF file
  • EP ID EP114748
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Alphonsa Johny, Dr. Jayasudha J. S (2013). Secure Socket Layer Implementations-A Review. International Journal of Computer Science & Engineering Technology, 4(2), 118-123. https://europub.co.uk/articles/-A-114748