{"id":778,"count":1,"description":"SSL | HTTPS | certificates | public key encryption | handshake protocol\n<strong>Transport Layer Security (TLS)<\/strong> is a cryptographic protocol that ensures secure communication over a computer network - especially over the internet. TLS ensures that data transmitted between two systems is protected against interception, manipulation and falsification. It is the successor to SSL (Secure Sockets Layer) and is used almost exclusively in modern applications.  \n\nFunctionality\nTLS works between the transport and application layers of the OSI model. The TLS handshake is at the heart of the protocol: it establishes a secure connection by performing authentication, key agreement and the exchange of cryptographic parameters. Typically, this involves the use of asymmetric cryptography (public key method) to protect the initial key exchange and symmetric encryption for data transmission after the handshake.  \nThe current TLS versions - currently mainly <strong>TLS 1.2 and TLS 1.3<\/strong> - continuously improve performance and security by eliminating outdated encryption methods and making the handshake process more efficient.\n\nAreas of application\nTLS is essential for many applications and services on the Internet:\n\n\n \t\n<strong>Websites (HTTPS)<\/strong>: The best-known area of application is HTTPS, the secure version of HTTP. Here, TLS protects communication between the browser and the web server. \n\n \t\n<strong>Email communication<\/strong>: Protocols such as SMTP, IMAP and POP3 use TLS to encrypt messages.\n\n \t\n<strong>VPNs and VoIP<\/strong>: Many VPN protocols and VoIP services use TLS to secure the transmitted data.\n\n \t\n<strong>API and microservice communication<\/strong>: In cloud architectures, TLS secures communication between services and external clients.\n\n\nAdvantages\nTLS offers numerous security advantages:\n\n\n \t\n<strong>Confidentiality<\/strong>: The data is encrypted so that only authorized recipients can read it.\n\n \t\n<strong>Integrity<\/strong>: Hash-based checks ensure that data has not been changed during transmission.\n\n \t\n<strong>Authenticity<\/strong>: Communication partners can authenticate each other with the help of certificates.\n\n \t\n<strong>Widespread support<\/strong>: TLS is supported by almost all modern browsers, operating systems and network components.\n\n\nRelated technologies\nOther security-relevant technologies are also important in connection with TLS: <strong>PKI (Public Key Infrastructure)<\/strong> manages certificates, while <strong>OCSP (Online Certificate Status Protocol)<\/strong> checks their validity. <strong>HTTP\/2<\/strong> also plays a role, as it uses TLS as a prerequisite. \nThe experts at BITS have used <strong>TLS<\/strong> and related technologies in a large number of projects. A selection of case studies and references can be found below.","link":"https:\/\/www.mybits.de\/en\/tag\/tls-en\/","name":"TLS","slug":"tls-en","taxonomy":"post_tag","meta":[],"_links":{"self":[{"href":"https:\/\/www.mybits.de\/en\/wp-json\/wp\/v2\/tags\/778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mybits.de\/en\/wp-json\/wp\/v2\/tags"}],"about":[{"href":"https:\/\/www.mybits.de\/en\/wp-json\/wp\/v2\/taxonomies\/post_tag"}],"wp:post_type":[{"href":"https:\/\/www.mybits.de\/en\/wp-json\/wp\/v2\/posts?tags=778"},{"href":"https:\/\/www.mybits.de\/en\/wp-json\/wp\/v2\/pages?tags=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}