From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Surveying SSL and TLS implementations

Surveying SSL and TLS implementations

From the course: Certified Ethical Hacker (CEH)

Surveying SSL and TLS implementations

- [Instructor] TLS, or the Transport Layer Security, is a protocol that provides secure communications over the internet. It is widely used to secure online transactions such as web browsing, email, and file transfers. Now there are a lot of examples of TLS implementations. One of the most popular is OpenSSL, which is a popular open source implementation that is widely used in web servers, in email servers, and many, many other applications including IoT and embedded devices and so on. It provides supports for a wide range of cryptographic algorithms, including AES, RSA, Elliptic Curve Cryptography, and many others. TLS is built into the Microsoft Windows operating system. It is built into Linux, Mac OS X, and basically it is used to secure a variety of applications, including the built-in web browsers, file transfer protocols, and many others. And pretty much all the different programming languages that are modern nowadays, they provide different libraries for encryption, whether…

Contents