1. Authentication of users and servers.
2. Encrypt data to hide the transmitted data.
The encryption technology used in SSL protocol includes both symmetric key encryption technology and asymmetric key encryption technology.
3. Protect the integrity of data
A new information service is provided by using hash function and secret sharing method, and a secure channel is established between the client and the server, so that all services processed by SSL protocol can reach their destinations completely and accurately in the transmission process.
From the above description, the secure channel provided by SSL protocol has the following three characteristics:
1. Data security information encryption is to convert plaintext input files into encrypted files through encryption algorithm to realize data security. The encryption process requires a key to encrypt data and then decrypt it. Without the key, the encrypted data cannot be decrypted. After data is encrypted, only the key should be transmitted in a secure way. Encrypted data can be transmitted publicly.
2. Consistency encryption of data can also ensure the consistency of data. For example, Message Verification Code (MAC) can verify the encrypted information provided by users, and the receiver can use MAC to verify the encrypted data to ensure that the data has not been tampered with during transmission.
3. Another purpose of security authentication encryption is to serve as personal identification, and the user's key can serve as his security authentication identification. SSL uses public key encryption technology (RSA) as an encrypted communication protocol between client and server when transmitting confidential data.
SSL uses HTTPS protocol to encrypt and sign messages, and uses SSL certificate to authenticate services.