{"id":6705,"date":"2024-04-01T03:16:04","date_gmt":"2024-04-01T03:16:04","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=dlp_document&p=6705"},"modified":"2024-04-01T03:16:07","modified_gmt":"2024-04-01T03:16:07","slug":"embracing-a-more-secure-era-with-tls-1-3","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hant\/document\/embracing-a-more-secure-era-with-tls-1-3\/","title":{"rendered":"Embracing a More Secure Era with TLS 1.3"},"content":{"rendered":"\n
TLS Background and Latest Developments<\/strong><\/p>\n\n\n\n Transport Layer Security (TLS) is the protocol that underpins secure client\/server communications over the Internet. TLS guarantees this by providing the cryptographic functions of authentication, confidentiality, and integrity checking. First, the identities of both the client and server are authenticated, to prevent impersonation by either party. For example, a bank\u2019s customer wants to be certain that they are sending their private information to their bank\u2019s authenticated server. Second, the messages sent between the endpoints need to remain confidential and unreadable, except for the client\/server. Finally, the integrity of exchanged messages must stay intact; that is, it should be impossible to modify messages without being detected. Together, the two phases of TLS perform these duties, with the \u201chandshake\u201d phase authenticating the client\/server and the \u201crecord\u201d phase preserving message confidentiality and integrity. TLS enhances security across various areas, including cloud services, data centers, network connections, and the expanding world of IoT.<\/p>\n\n\n\n First developed in 1994 by Netscape, the Secure Socket Layer (SSL) was the predecessor of TLS. However, the initial version (v1.0) of SSL was never published because of too many security flaws. Thus, the official history of TLS begins with SSL v2.0, as seen in the timeline below:<\/p>\n\n\n\n <\/p>\n\n\n