1 00:00:08,240 --> 00:00:15,380 Let us start with the last lecture of fundamental cyber cybersecurity model, and that is the transport 2 00:00:15,380 --> 00:00:16,250 layer security. 3 00:00:16,640 --> 00:00:23,510 In this lecture, you will learn to describe the transport security protocol and the tireless handshaking 4 00:00:23,510 --> 00:00:24,030 protocol. 5 00:00:24,710 --> 00:00:25,760 Let us get started. 6 00:00:27,170 --> 00:00:29,510 What is transport layer security? 7 00:00:29,570 --> 00:00:30,560 That is peerless. 8 00:00:31,510 --> 00:00:39,130 Beardless is a cryptographic protocol that provides end to end communications security on networks and 9 00:00:39,130 --> 00:00:43,390 is widely used for Internet communications and online transactions. 10 00:00:44,260 --> 00:00:51,220 It is an IETF standard intended to prevent eavesdropping, tampering and message forgery. 11 00:00:52,510 --> 00:01:00,550 Common applications that employ tearless include web browsers, instant messaging, applications, emails 12 00:01:00,790 --> 00:01:02,530 and voice over Internet protocol. 13 00:01:04,060 --> 00:01:12,130 Many businesses used to secure all the communications between the Web servers and browsers, regardless 14 00:01:12,130 --> 00:01:15,190 of whether sensitive data is being transmitted. 15 00:01:16,780 --> 00:01:23,710 Beardless Predecessors', that is the secure soccer player, was developed by Netscape in 1995. 16 00:01:24,700 --> 00:01:29,560 Now the obvious question is what is the difference between tearless and unnecessary? 17 00:01:31,180 --> 00:01:39,490 Fearless is more efficient and more secure than SSL as it has a stronger message authentication, key 18 00:01:39,490 --> 00:01:42,880 material generation and other encryption algorithms. 19 00:01:43,630 --> 00:01:53,470 For example, Dialis support pre keys, secure remote passwords, elliptical keys and cabarrus that 20 00:01:53,470 --> 00:01:54,970 as SSL does not. 21 00:01:56,370 --> 00:02:05,020 Businesses are not interoperable, but the U.S. does offer backward compatibility for older devices 22 00:02:05,170 --> 00:02:06,340 still using a system. 23 00:02:07,860 --> 00:02:15,630 The is protocol specification defines two layers, there'd be electrical protocol, provides connection, 24 00:02:15,650 --> 00:02:23,970 security and peerless handshake protocol enables the client and so to authenticate each other and negotiate 25 00:02:24,180 --> 00:02:27,450 security keys before any data is transmitted. 26 00:02:29,220 --> 00:02:32,340 So this is the peerless handshaking protocol. 27 00:02:32,970 --> 00:02:35,760 The peerless handshake is a multi-step process. 28 00:02:36,360 --> 00:02:43,410 A basic loose handshake involves the client and the server sending hello messages and the exchange of 29 00:02:43,410 --> 00:02:46,090 keys, cipher message and a finished message. 30 00:02:46,770 --> 00:02:47,930 Let's get started here. 31 00:02:48,480 --> 00:02:58,200 So the client since hello the server replies hello certificate plus done client replies client key exchange 32 00:02:58,390 --> 00:03:03,060 plus change siple specification and then client is finished. 33 00:03:03,870 --> 00:03:10,140 Then server replies OK, change cyper specifications changed and Silva replies finish. 34 00:03:10,650 --> 00:03:13,830 Now the handshake protocol is being established. 35 00:03:14,220 --> 00:03:20,580 A secure connection is being established between client and server and then the transfer of data begins. 36 00:03:21,390 --> 00:03:28,380 So the server checks what the highest SSL or Peeler's version is that being supported by both of them? 37 00:03:29,580 --> 00:03:35,580 This certificate must be trusted either by the client itself or a party that the client trust. 38 00:03:36,090 --> 00:03:39,480 We have seen about these certificates in previous videos.