This website uses cookies to ensure you have the best experience. Learn more

Transport Layer Security And Secure Shell

1420 words - 6 pages

The fundamental reason why security protocols are implemented in networks is simple – to protect data as it traverses the network. The mechanism associated with protecting data on its travels is called cryptography. This particular mechanism employs algorithms which encrypt data so that hackers are prevented from easily intercepting the data. Cryptography operates in tandem with a group of protocols which help to control the passing of data between network devices. Therefore, security protocols are a vital component in networks in order to increase data security and without them security would be compromised (Linn, 2014).

The main section of the report will give an overview of both protocols in question, followed by a look at the similarities and differences between the protocols including any advantages and disadvantages. The report shall then analyse associated infrastructure requirements and scenarios where both protocols could be implemented.

Main Section

A Brief Overview of TLS and SSH:

TLS (short for Transport Layer Security) was first released in January 1999 and its main focus was to ensure secure data communication. TLS provides the means for a variety of client and server applications to converse efficiently and to rule out the possibility of any data being captured and in worst cases tampered with.
The TLS protocol is composed of two major levels and these are termed the Handshake Protocol and the Record Protocol. The Handshake protocol means that
the client and server are able to correspond with one another though only if authentication has been established. Both the client and server can then come to a decision on a particular encryption method before any data can be transmitted.
The Record protocol exists in order to establish a confidential yet efficient
connection between both devices (McKinley, 2003).

Secure Shell abbreviated SSH, is a protocol that exists primarily to allow administrators remote access to their own servers or another computer for that matter. An example of Secure Shell in practice could be that a certain network administrator is required to make a password change whilst he or she is not present in the workplace. Secure Shell features very robust encryption technology which makes hacking attempts extremely difficult even for the most skilful of intruders. Furthermore, the established connection is ciphered and the transmitted data in an inconsistent order meaning it is virtually impossible for anyone to exploit (Gil, 2014).

Similarities and Differences:

In terms of similarities, there is one clear similarity between both protocols and it is that they depend upon a similar encryption algorithm for connection establishment. The initial connection is set up through asymmetric encryption and a symmetric session key is required to be transmitted so that quicker encryption of session related traffic can take place (Paw, 2012).
There are however...

Find Another Essay On Transport Layer Security and Secure Shell

Networking: Network Security Essay

2472 words - 10 pages that takes into account both the similarities and differences in approach and features and their relative advantages and disadvantages. This information will then be backed up by examples where each protocol would be preferred to the other in a certain situation along with my own personal reasoning based on the research that has been carried out on my part. What Is TLS? TLS (Transport Layer Security) is the successor to another security

How a Switch Has an Advantage ove a Bridge in a Network

1996 words - 8 pages security protocol are that the entities can create a secure channel between themselves can agree on some available algorithms and keys to be used. The packets exchanged between two parties can be encrypted and a shared key agreed upon in the first step. Data integrity and origin authentication. One of the disadvantage of IPSec is that in transport mode does not protect the IP header, it only protects the payload (Forouzan, 2013). Secure Socket Layer

Internet Protocol Security (IPSec) for Backbones

1245 words - 5 pages (Authentication Header) and ESP(Encapsulated Security Payload).For implementing these protocols , ISAKMP is used. There are other security protocols in the upper layer of TCP/IP working like SSL and these all security protocols need security parameter for establishing a secure connection over the network and each security protocol is doing this by negotiation their own security parameter with the other party. That’s why each security protocol is

Security And The OSI Model

1411 words - 6 pages Security and the OSI Model Network security is a topic that reaches far beyond the realm of firewalls, passwords, and user ID accounts. For a network and data to remain secure there must be protective measures at each level in the OSI interconnect model. While each layer basically operates autonomously of the other it is important to ensure that the data being transmitted from the host to destination has not been tampered with or is being

The main benefits of the OSI model

585 words - 2 pages ; Offers a physical address so a device's data can be sent on the network • Works with a device's networking software when sending and receiving messages • Provides error-detection capability Common components of this layer are NIC cards, Ethernet and Token ring switches and bridges. Layer 3 Layer 4 Layer 4 being the transport layer of the OSI model offers end-to-end communication between end devices through a network. Depending on the

Questions Regarding the TCP/IP Network Model

2300 words - 10 pages application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate. Explain how the two important transport protocols deliver messages on behalf of the application and discuss the differences between them The TCP/IP is the

The Open System Interconection Seven Layers

1254 words - 5 pages , data link, network, transport, session, presentation, and application layers. The purpose of this model was, and still is, to simplify and set a standard for the design of communication and networking products that can communicate with each other, regardless of system differences. Layer Functions The Open Systems Interconnection model breaks down host-to-host transmissions into seven different layers where each one performs a specific function

iso/osi protocols

2330 words - 10 pages : TCP IP protocol stack"). The TCP/IP stack is basically complete set of networking guidelines. In order to send data over a TCP/IP network it will require four layers, which are the application, transport, inter and link layers. First, the application layer encodes the data being sent. It is more concerned with defining the actions. It involves user interfaces and application programs. The layer operates by sending unbroken data stream into

Defense against Collaborative attacks in MANET

1731 words - 7 pages hole attack, worm hole attack, Dos attack, grey hole attack. Mostly AODV, DSR, DSDV are prone to the attacks. Research work concentrates in the field of routing and security. MANET has attacks in all the layers. In the physical layer jamming, intercept and eavesdrop attacks may occur. In the data link layer, traffic analysis, monitoring, disruption may occur. In the network layer, wormhole, black hole, byzantine, flooding, resource consumption may

Huffman Trucking Network Analysis

1320 words - 5 pages them into packets with a network layer header. This layer must also send messages to the data link layer for communication. Finally the network layer is responsible for error handling and diagnostics, meaning that devices that connected logically, exchange information about the status of the devices on the network.The fourth (4) layer known as the transport layer, "is responsible for delivering data to the appropriate application process on the

OSI Model

2117 words - 8 pages is as important in computer communication as it is in regular conversation.1 Transport The transport layer makes sure that the data is reliably delivered and helps in error correction. This layer acknowledges receipt of data from the sender. It is much like what happens when sending certified or registered mail in the postal system.3 The transport layer can also segment the data. This happens when the sender sends a

Similar Essays

Transport Layer Security Essay

1305 words - 5 pages computer security is in fact safe, or it is all a false hope. One extremely common target is TLS. TLS, or Transport Layer Security, is the main protocol used in secure communication over the internet. All secure webpages are transferred using this protocol, or its predecessor SSL (Secure Sockets Layer), and “https” signals its usage. One main component is the public and private key encryption. In this setup, the private key can decrypt messages from

Shedding The Light On The Network, Transport And Application Layer Protocols Of Osi Model

2406 words - 10 pages Executive Summary This report is a response to an individual assignment to partially fulfill the requirements of (TN6384 Computer Network) module. It aims to shed the light on the Network, transport, and application-layer protocols of OSI Model. The report begins with presenting a relevant background to the topic, presenting the historical perspective of OSI protocols. In addition, it explains the purpose and importance of these protocols

Security And The Osi Model Essay

1605 words - 6 pages Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between

Network Security Concepts Essay

1772 words - 7 pages passwords along with Secure Sockets Layer (SSL), Secure Shell (SSH) and Transport Layer Security (TLS), with Wireless TLS when needed, to provide greater security (Reed, 2004). Expirations and timeouts can improve security at the session layer, also (Song, 2004). The presentation layer handles the compression, encryption and standardization of the data for the application layer to the session layer to remove differences in the format of data (Reed