IP Security
IP Security Terminology
SSL/TLS
Note: Secure Socket Layer (SSL) has been renamed Transport Layer Security (TLS). TLS 1.0 is based
on SSL 3.0/3.1. This document hereafter uses the term TLS.
TLS is a security mechanism based on cryptography (see Cryptography) and is used for
encrypting communications between users and TLS-based Websites. The encryption is
designed as a means to create barriers to eavesdropping and tampering with any transmitted
data.
TLS operates on the OSI Model Level 5 and uses PKI (see Public Key Infrastructure).
Public Key Infrastructure
Public Key Infrastructure (PKI) is a component of Public Key Cryptography (PKC) that uses:
Public Key Certificates, see Public Key Certificates (Digital Certificates)
l
Certificate Authorities, see Certificate Authorities
l
Public Key Certificates (Digital Certificates)
Public Key Certificates are used for key exchange and authentication. They are simply
electronic documents (files) that incorporate a digital signature to bind together a public key with
an identity (information such as the name or a person or organization, their address, and so
forth).
The signature may be signed by a trusted entity called a Certificate Authority (CA), see
Certificate Authorities.
The most common use of public key certificates is for TLS certificates (https websites).
Certificate Authorities
A Certificate Authority or Certification Authority (CA) is a trusted entity which issues public key
certificates. The certificates contain a public key and the identity of the owner. The CA asserts
that the public key belongs to the owner, so that users and relying parties can trust the
information in the certificate.
Avaya 374x DECT Telephones - User Guide
IP Security
31
02/2016