Security protocol: SSL, TSL, SSH overview

Source: Internet
Author: User

    • SSL (Secure Socket layer--layer): A security protocol for network communication security and data integrity, which encrypts the network connection at the TCP/IP transport layer ;
    • TSL (Transport layer security--Transport Layer Security): for the successor version of SSL 3.0, the significant difference between TSL and SSL 3.0 is that the encryption algorithm is different, the main purpose of TSL is to make SSL more secure, so that the protocol specification is more accurate and perfect, The transport layer of TCP/IP encrypts the network connection;
    • SSH (Secure Shell): Established by the IETF Network Working Group, SSH is a security protocol based on the application layer and Transport layer . SSH is currently a more reliable protocol that provides security for Telnet sessions and other network services. The use of SSH protocol can effectively prevent the information leakage in the remote management process.
the summary algorithm commonly used by the above protocols:

SHA (full Secure Hash algorithm) is a secure hashing algorithm that maps messages of any length to a fixed-length hash value (also known as a Message digest).

The SHA family of five algorithms, namely SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, are sometimes called sha-2.sha-1 in many security protocols, including TLS and SSL, PGP, SSH, s/ MIME and IPSec. In 2005, the cryptology proved that SHA-1 's crack speed was 2000 times times higher than expected, although the hack is still extremely difficult and expensive, but as the computer becomes faster and cheaper, the security of the SHA-1 algorithm is declining year after time, and has been seriously questioned by the cryptology, hoping for a higher security intensity s HA-2 replace it.

Security protocol: SSL, TSL, SSH overview

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.