ABSTRACT

This chapter discusses various encryption protocols versus authentication protocols. Transport Layer Security (TLS) is the successor to Secure Socket Layer (SSL); both protocols provide secure communication over a computer network. Some key establishment schemes such as Rivest–Shamir–Adleman key transport do not require client transport keys, only server transport keys are necessary. The TLS client encrypts a random number using the TLS server keys which both entities use to derive the session keys (SKs). Once the TLS handshake protocol has established the SKs, the TLS record protocol encrypts each message between the SSL client and the SSL server. The TLS Ciphertext record shows four elements: the Content Type, the Protocol Version, the Length field, and the Generic Cipher field. There are three encryption options for the Generic Cipher: stream cipher encryption, block cipher encryption, and the authenticated encryption with additional data encryption.