Write answers for the Questions

Anonymous
timer Asked: Jun 18th, 2019
account_balance_wallet $5

Question Description

Write answers in a word document:

  • What protocols comprise TLS?
  • What is the difference between a TLS connection and a TLS session?
  • List and briefly define the parameters that define a TLS session state.
  • List and briefly define the parameters that define a TLS session connection.
  • What services are provided by the TLS Record Protocol?
  • What steps are involved in the TLS Record Protocol transmission?
  • What is the purpose of HTTPS?
  • For what applications is SSH useful?
  • List and briefly define the SSH protocols.

Tutor Answer

Paulidavo
School: Rice University

Hi, kindly receive the complete solution in the attached files below. In case you need any clarification, feel free to reach me any time. Thank you.

Running head: Answers for The Questions

1

Answers for The Questions
Name
Institution

Answers for The Questions

2

ANSWERS FOR THE QUESTIONS
1. What protocols comprise TLS?
Transport Layer Security (TLS) is a convention that can be utilized with different assemblies like
UDP to give security between applications conveying over an IP arrange. TLS uses encryption to
guarantee protection, so various gatherings can't listen stealthily or alter the messages sent.
Utilizing TLS, a protected association is built up by validating the customer and server, or User
Agent Client and User Agent Server, and after that scrambling the association between them.
Transport Layer Security is a successor to Secure Sockets Layer (SSL), which was created by
Netscape. In as much as it depends on SSL 3.0, TLS is a standard that has been characterized in
RFC 2246 and is intended to be its substitution. In this standard, TLS a multilayer convention that
comprises of TLS Handshake Protocol and TLS Record Protocol
2. What is the difference between a TLS connection and a TLS session?
The distinction between a TLS association and a TLS session are their affiliations. A TLS
association is shared, and it is a carrier that gives a reasonable kind of administration. Conversely,
a TLS session is between a customer and a server; courses describe plenty of protection parameters
that can be utilized among various affiliations.
3. List and briefly define the parameters that define a TLS session state.
Following is a rundown of parameters that characterize a TLS session state.


Session identifier: A self-assertive byte grouping settled on by the server to categorize
a functioning state.



Master secret:48-byte mystery shared between the customer and server

Answers for The Questions

3



Peer certificate: An X509.v3 endorsement of the friend; this parameter might be null



Compression method: The calculation used to pack information befor...

flag Report DMCA
Review

Anonymous
awesome work thanks

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors