This paper intends to discuss SSLs, how they work, their advantages and drawbacks. It will end with the author’s thoughts on the efficacy of the system and whether it is a viable solution for the majority of network security problems or if those drawbacks prevent that.
Keywords
Secure Socket Layer (SSL); Security of Networks; Man in the Middle (MITM) Attacks; Transport Layer Security (TLS); Authentication; Confidentiality; Integrity; Encryption; Decryption; Private key; Public key; Rivest; Shamir and Adleman (RSA); Certification Authorities
Subject
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.