The SSL protocol includes two sub-protocols: the SSL
record protocol and the SSL handshake protocol.
The SSL record protocol defines the format used to
transmit data.SSL handshake protocol involves using the
SSL record protocol to exchange a series of messages
between an SSL-enabled server and an SSL-enabled client
when they first establish an SSL connection. This
exchange of messages is designed to facilitate the
following actions:
Authenticate the server to the client.
Allow the client and server to select the cryptographic
algorithms, or ciphers, that they both support.
Optionally authenticate the client to the server.
Use public-key encryption techniques to generate
shared secrets.
Establish an encrypted SSL connection.
SSL technology is used to establish a secure and
encrypted communication channel between two Internet
connected devices. The SSL protocol uses RSA algorithm
which is a public key algorithm for encryption and
decryption developed by Rivest, Shamir, and Adleman.
SSL protocol also uses concept of Certificates.
Certificates are digital documents attesting to the binding
of a public key to an individual or other entity. An SSL
certificate contains the following information:
1. The domain for which the certificate was issued.
2. The owner of the certificate (who is the also the
person/entity who has the right to use the domain).
3. The physical location of the owner.
4. The validity dates of the certificate.
SSL provides confidence in the integrity and security in
network infrastructure. Clients are becoming increasingly
aware of the advantages of SSL security.