Security Protocols

Home > Computer Science > Computer Security and Cryptography > Security Protocols

An explanation of common cryptographic protocols such as TLS, SSH, and IPSec used to establish secure communication channels over the network.

Encryption: The process of encoding information in such a way that only authorized parties can read it. It ensures the confidentiality of information and prevents unauthorized access.
Authentication: The process of verifying the identity of a user, device, or application. It prevents fraudulent use of resources and ensures that only authorized users can access them.
Key management: The process of generating, distributing, storing, and revoking cryptographic keys. It is critical to the security of encrypted communication and other security protocols.
Hashing: The process of creating a unique digital fingerprint of a message or document. It is used for data integrity checks and to verify the authenticity of data.
Digital signatures: A cryptographic technique used to ensure the authenticity and integrity of digital documents or messages. It is used to prevent unauthorized access, tampering, or forgery.
SSL/TLS: Secure Socket Layer (SSL) and Transport Layer Security (TLS) are protocols used to secure communication over the internet. They ensure confidentiality, integrity, and authenticity of web communication.
Public key infrastructure (PKI): It is a system of digital certificates, trusted authorities, and other protocols used to secure communication over the internet. It ensures the privacy, integrity, and authenticity of online communication.
Firewall: A hardware or software device used to protect a network from unauthorized access. It filters incoming and outgoing traffic and blocks unwanted traffic.
Intrusion detection systems (IDS): A security mechanism used to detect and respond to unauthorized access attempts, security breaches, or other malicious activity.
Access control: The process of granting or denying access to a resource based on the identity or credentials of the requestor. It ensures that only authorized users can access sensitive or confidential information.
Risk management: The process of identifying and assessing potential security risks, and implementing strategies to mitigate or prevent them.
Penetration testing: The process of evaluating the security of a system by attempting to exploit its vulnerabilities.
Cybersecurity regulations and compliance: Legal and regulatory requirements related to cybersecurity, such as HIPAA, GDPR, and PCI DSS.
Ethical hacking: The process of using hacking techniques for legitimate purposes, such as vulnerability testing, security auditing, or risk assessment.
Cloud security: The process of protecting data, applications, and infrastructure in cloud-based environments. It involves managing different types of risks, such as data breaches, data loss or downtime.
Mobile security: The process of securing data and devices used in mobile computing. It involves protecting the data stored or transmitted on mobile devices and ensuring the security of wireless networks.
Identity management: The process of managing user identities, access rights, and privileges. It involves implementing authentication and authorization protocols to prevent unauthorized access.
Secure coding practices: The process of developing software using security best practices. It involves minimizing vulnerabilities and coding errors that may create security risks.
Network security: The process of securing a computer network against unauthorized access or attacks. It involves implementing firewalls, intrusion detection systems, and other preventive measures.
Incident response: The process of responding to a security incident or breach. It involves detecting the incident, containing the damage, and preventing further attacks.
Transport Layer Security (TLS): A cryptographic protocol that provides privacy and data integrity between two communicating applications.
Secure Sockets Layer (SSL): A predecessor of TLS, SSL secures communications between a client and server by encrypting data and authenticating each party.
Hypertext Transfer Protocol Secure (HTTPS): A protocol used to secure web communications by encrypting data sent between a client and server.
Internet Protocol Security (IPsec): A suite of protocols used to secure IP communications at the network layer.
Secure Shell (SSH): A protocol that allows secure remote access to a machine over an unsecured network.
Pretty Good Privacy (PGP): A hybrid encryption system used for secure email communication.
Advanced Encryption Standard (AES): A symmetric block cipher used for encryption and decryption of electronic data.
Rivest-Shamir-Adleman (RSA): A public-key cryptographic system used for secure data transmission and digital signature verification.
Data Encryption Standard (DES): A symmetric key algorithm used for encryption and decryption of electronic data.
Blowfish: A symmetric block cipher used for encryption and decryption of electronic data.
Twofish: A symmetric block cipher used for encryption and decryption of electronic data.
Elliptic Curve Cryptography (ECC): A public-key cryptographic system used for secure data transmission and digital signature verification using elliptic curves.
Kerberos: A network authentication protocol that provides secure user authentication over a non-secure network.
Lightweight Directory Access Protocol Secure (LDAPS): A protocol used to secure communications between a client and server when retrieving and modifying directory information.
Digital Signature Algorithm (DSA): A public-key cryptographic system used for digital signature verification.
Challenge-Handshake Authentication Protocol (CHAP): A protocol used for remote authentication over PPP connections.
Secure/Multipurpose Internet Mail Extensions (S/MIME): A protocol used for secure email communication that provides encryption, digital signatures, and message authentication.
Transport Layer Security Authentication (TLSA): A protocol used for secure communications between two applications by providing trust authentication over TLS.
Secure File Transfer Protocol (SFTP): A protocol used for secure file transfer over SSH.
Secure Real-time Transport Protocol (SRTP): A protocol used for secure real-time voice and video communication over IP networks.
"The TLS protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography, such as the use of certificates, between two or more communicating computer applications."
"The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible."
"It runs in the presentation layer and is itself composed of two layers: the TLS record and the TLS handshake protocols."
"The TLS record protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography."
"The TLS handshake protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography."
"The closely related Datagram Transport Layer Security (DTLS) is a communications protocol that provides security to datagram-based applications."
"In technical writing, references to '(D)TLS' are often seen when it applies to both versions."
"TLS is a proposed Internet Engineering Task Force (IETF) standard, first defined in 1999."
"The current version is TLS 1.3, defined in August 2018."
"TLS builds on the now-deprecated SSL (Secure Sockets Layer) specifications developed by Netscape Communications for adding the HTTPS protocol to their Navigator web browser."
"The protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography."
"The primary purpose of the TLS protocol is to provide communications security over a computer network."
"It runs in the presentation layer."
"The TLS protocol aims to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography, such as the use of certificates."
"but its use in securing HTTPS remains the most publicly visible."
"The protocol is widely used in applications such as email, instant messaging, and voice over IP."
"The TLS protocol aims to provide privacy (confidentiality) through the use of cryptography."
"The TLS protocol aims to provide integrity through the use of cryptography."
"The TLS handshake protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography."
"The SSL specifications were developed by Netscape Communications in 1994, 1995, and 1996 for adding the HTTPS protocol to their Navigator web browser."