1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 Figure 5-86: Decryption, Figure 5-85: Encryption

1 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 246
Download on canonical page 246 pages, 2.94 Mb

5.12.1.1 Concepts

SSL is used to authenticate endpoints and to secure the contents of the application-level communication. An
SSL-secured connection begins by establishing the identities of the peers, and establishing an encryption
method and key in a secure way. Application-level communication can then begin. All incoming traffic is
decrypted by the intermediate SSL layer and then forwarded on to the application; outgoing traffic is
encrypted by the SSL layer before transmission.
SSL uses encryption with symmetric keys for data transfer, encryption with asymmetric keys for exchanging
symmetric keys, and one-way hash functions for data integrity. The following sections briefly describe
encryption and message-digest concepts, and how they are used to implement data confidentiality, data
integrity, and the authentication mechanism.

5.12.1.1.1 Encryption

Encryption is a process of disguising a message. Encryption transforms a clear-text message into cipher text.
Decryption converts cipher text back into the original, comprehensible clear text.
Most encryption processes involve the use of an algorithm and a key. For example, in the previous
illustration, the algorithm was “replace alphabets by moving forward” and the key was 2.
182
Figure 5-86: DecryptionFigure 5-85: Encryption
MENU

Models

Contents