Based on reliable transmission protocols (such as TCP), it has the functions of compression/decompression, encryption/decryption, computer MAC and other security-related operations.
2.SSL handshake protocol
It is based on SSL recording protocol and is used to transfer application data between client and server. Used for identity authentication, negotiation of encryption algorithm, exchange of encryption keys, etc. Before the actual data transmission starts.
Extended data
SSL security advantages
1, eavesdropping and man-in-the-middle attack
SSL uses the encryption algorithm and key determined by both communication parties through negotiation, and different encryption algorithms can be found for different security level applications, thus being used for data encryption. It has the characteristics of good key protection performance and frequent key replacement, and is highly defensive against eavesdropping and man-in-the-middle attacks.
2. Traffic data analysis attack
The core of traffic data analysis attack is to try to attack by checking the unencrypted fields of packets or the unprotected packet properties. In general, attacks are harmless, and SSL can't stop them.
3. Interception and reorganization of attacks
For those who need strong connection encryption, this kind of security needs to be considered. SSL V3.0 can basically prevent this kind of attack.
4. Message retransmission attack
Message retransmission attack is easy to prevent, and SSL prevents this attack by including "serial number" in MAC packet.
Baidu encyclopedia-ssl