Description
Write answers in a word document:
- What protocols comprise TLS?
- What is the difference between a TLS connection and a TLS session?
- List and briefly define the parameters that define a TLS session state.
- List and briefly define the parameters that define a TLS session connection.
- What services are provided by the TLS Record Protocol?
- What steps are involved in the TLS Record Protocol transmission?
- What is the purpose of HTTPS?
- For what applications is SSH useful?
- List and briefly define the SSH protocols.
Explanation & Answer
Attached.
Running Head: Answer the Questions
Answer the Questions
Student name
Institutional affiliation
Date
ANSWER THE QUESTIONS
2
Q1 What protocols comprise TLS?
The TLS Handshake Protocol which is used to authenticate the participants of the communication
and negotiate an encryption algorithm. The handshake protocol also allows client and server to
agree on encryption methods. TLS Record Protocol ensures that the data bartered amid the parties
is not altered. This decorum can be used with or lacking encryption
Q2 What is the difference between a TLS connection and a TLS session?
A TLS connection is peer-to-peer, and it is a conveyance that provides an appropriate type of
service. On the other hand, a TLS session is amid a client and a s...