- SSL (Secure Socket layer--layer): A security protocol for network communication security and data integrity, which encrypts the network connection at the TCP/IP transport layer ;
- TSL (Transport layer security--Transport Layer Security): for the successor version of SSL 3.0, the significant difference between TSL and SSL 3.0 is that the encryption algorithm is different, the main purpose of TSL is to make SSL more secure, so that the protocol specification is more accurate and perfect, The transport layer of TCP/IP encrypts the network connection;
- SSH (Secure Shell): Established by the IETF Network Working Group, SSH is a security protocol based on the application layer and Transport layer . SSH is currently a more reliable protocol that provides security for Telnet sessions and other network services. The use of SSH protocol can effectively prevent the information leakage in the remote management process.
the summary algorithm commonly used by the above protocols:
SHA (full Secure Hash algorithm) is a secure hashing algorithm that maps messages of any length to a fixed-length hash value (also known as a Message digest).
The SHA family of five algorithms, namely SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, are sometimes called sha-2.sha-1 in many security protocols, including TLS and SSL, PGP, SSH, s/ MIME and IPSec. In 2005, the cryptology proved that SHA-1 's crack speed was 2000 times times higher than expected, although the hack is still extremely difficult and expensive, but as the computer becomes faster and cheaper, the security of the SHA-1 algorithm is declining year after time, and has been seriously questioned by the cryptology, hoping for a higher security intensity s HA-2 replace it.
Security protocol: SSL, TSL, SSH overview