Tutorials

How does SSL/TLS work – part five - FTPS

An earlier group of posts in this series covered the SSL/TLS protocol in detail. They neglected, however, to mention one of the most common uses of SSL/TLS - to implement a secure form of file transfer known as FTPS.

8 min read Read More

How does SSH work - part three

SSH-2 uses a layered architecture, consisting of a transport layer, a user authentication layer, and a connection layer (described here).

5 min read Read More

How does SSL/TLS work - part three

The previous post in this series about SSL/TLS described the handshake - the process that establishes an SSL/TLS session between client and server. The session includes agreed-upon encryption keys. Now, …

5 min read Read More

How does SSL/TLS work - part one

The Secure Sockets Layer (SSL) is a cryptographic protocol designed to secure communications over TCP/IP networks. SSL was developed by Netscape during the early 1990's, but various security flaws meant …

4 min read Read More

How does SSL/TLS work - part two

As part one explained, SSL/TLS is intended to provide secure network connections between a client (e.g. a web browser), and a server (e.g. a web server) by encrypting all data …

8 min read Read More

What are cryptographic hashes?

Cryptographic hash algorithms are important mathematical functions used widely in software, particularly in secure protocols such as SSL/TLS and SSH.

8 min read Read More