Académique Documents
Professionnel Documents
Culture Documents
TLS is based on the Secure Socket Layer (SSL), a protocol originally created by Netscape.
One advantage of TLS is that it is application protocol independent.
The TLS protocol runs above TCP/IP and below application protocols such as HTTP or IMAP.
The HTTP running on top of TLS or SSL is often called HTTPS.
Transport Layer Security (TLS) Protocol provides privacy and data integrity between two
communicating applications.
The protocol is composed of two layers: the TLS Record Protocol and the TLS Handshake Protocol.
At the lowest level, layered on top of some reliable transport protocol (TCP) is the TLS Record Protocol.
The algorithms used would ensure that only a party with the corresponding digital key would be
able to confirm the transaction. This way a consumer’s credit card or bank account could be
used without revealing details such as the account number. Thus, SET was a form of security
against account theft, hacking, and other criminal actions.