By Topic

TLS specification changes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
S. Gadanayak ; Jataayu Software (P) Ltd., Bangalore, India

The transport layer security (TLS) protocol specification provides privacy and data integrity between two communicating applications. The protocol is composed of two layers: the TLS record protocol and the TLS handshake protocol. The TLS record protocol provides connection security, which is private and reliable. The goals of the TLS protocol are: cryptographic security - TLS should be used to establish a secure connection between two parties; interoperability - independent programmers should be able to develop applications utilizing TLS that will be able to successfully exchange cryptographic parameters without knowledge of one another's code; extensibility - TLS seeks to provide a framework into which new public key and bulk encryption methods can be incorporated as necessary; this will also accomplish two sub-goals: to prevent the need to create a new protocol (and risking the introduction of possible new weaknesses) and to avoid the need to implement an entire new security library; relative efficiency - cryptographic operations, in particular public key related operations, tend to be highly processor intensive. For this reason, the TLS protocol has incorporated an optional session caching scheme to reduce the number of connections that need to be established from scratch, which in turn reduces the network traffic.

Published in:

2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005.

Date of Conference:

23-25 Jan. 2005