Skip to content

Understanding and Function of SSL (Secure Socket Layer) On Computer Network

Understanding SSL (Secure Socket Layer) On Computer Network

Computer news – Secure Socket layer or commonly abbreviated SSL is a protocol at the transport layer that uses different algorithms to establish security with authentication systems using certificates, encryption, judi bola, integrity checks and session key exchange algorithms on the network. SSL will allow communication between the WWW-server and the WWW-client to communicate securely and encrypted so that hackers will find it difficult to steal data.

The SSL protocol can not run alone in securing data but requires another protocol that is HTTPS or HTTP Secure protocol. Where HTTP Secure is a secure HTTP protocol that allows data passing through the HTTPS protocol to be encrypted.

Excess SSL (Secure Socket Layer) On Computer Network

SSL offers several levels of security that will help administrators secure data managed. There are three levels of security offered by SSL namely:

1. Authentication
With this system it is possible to be able to ensure the received messages come from the person or the user who is explicit.
2. Confidentiality
With this system it is possible to protect messages from unauthorized persons to read the message as long as the message is delivered (in data traffic.
3. Integrity
With this system can ensure that the message is genuine and does not change data during the transit trip.

SSL (Secure Socket Layer) Function On Computer Network

SSL or Secure Socket Layer serves to provide a standard communications infrastructure that enables an application to use the infrastructure easily and almost invisibly. SSL also provides very secure authentication. Basic authentication mechanisms such as Telnet passwords and basic HTTP authentication become very powerful when using SSL compared to ordinary TCP, where SSL passwords are no longer sent in plaintext. SSL encrypts connections, not data on both parties communicating, and does not contain mechanisms for user authentication or password protection (only authenticated connections, security will fail if machines on both parties are communicating compromised).