Generated by GPT-5-mini| TLS (Transport Layer Security) | |
|---|---|
| Name | TLS (Transport Layer Security) |
| Developer | Internet Engineering Task Force |
| Initial release | 1999 |
| Latest release | 1.3 |
| Written in | C, Assembly, OpenSSL, implementation languages |
| Operating system | Cross-platform |
| Genre | Cryptographic protocol |
TLS (Transport Layer Security) TLS (Transport Layer Security) is a cryptographic protocol that provides confidentiality, integrity, and authentication for communications over packet-switched networks. It is widely used to secure web traffic, email, instant messaging, and virtual private networks, and underpins many Internet standards specified by organizations such as the Internet Engineering Task Force, World Wide Web Consortium, and International Organization for Standardization. Major software projects and vendors including OpenSSL, Mozilla, Google, Microsoft, and Apple provide implementations or integrations of TLS for client and server platforms.
TLS operates above the Transmission Control Protocol layer to secure end-to-end sessions between endpoints such as a web browser and a web server, or an email client and a mail server. Typical use cases include HTTPS connections to sites run by organizations like Amazon (company), Facebook, Twitter, Bank of America, and Google LLC and secure SMTP links between providers such as Microsoft Exchange and Gmail. The protocol achieves security goals through a sequence of handshakes, cipher suite negotiation, certificate-based authentication often involving X.509, and optional session resumption features used by large-scale services like Cloudflare and Akamai Technologies. Ecosystem actors such as Let's Encrypt, DigiCert, Entrust, Comodo, and Symantec issue certificates that enable identity assertions in TLS.
TLS evolved from Secure Sockets Layer originally developed by Netscape Communications to secure early web commerce practiced by companies like eBay and Amazon (company). The Internet Engineering Task Force standardized successive iterations, publishing requests for comments guiding changes adopted across browsers from Netscape Navigator to Mozilla Firefox, Google Chrome, Microsoft Edge, and Apple Safari. High-profile incidents and research by entities such as Moxie Marlinspike and teams at University of California, Berkeley, Stanford University, MIT, and ETH Zurich influenced revisions and prompted deprecation of insecure constructs. Industry responses from Amazon Web Services, Microsoft Azure, Google Cloud Platform, Facebook and content delivery networks like Akamai Technologies accelerated adoption of modern versions.
TLS is composed of a record layer and a handshake protocol; the record layer provides framing for higher-level protocols such as Hypertext Transfer Protocol and SMTP while the handshake establishes shared keys and negotiates algorithms. TLS handshakes involve exchanges of messages like ClientHello and ServerHello between clients (e.g., Mozilla Firefox) and servers (e.g., Apache HTTP Server, nginx), negotiation of cipher suites maintained by IETF Working Groups, and use of certificate chains anchored to root authorities such as DigiCert, Let's Encrypt, and national trust stores like those curated by Microsoft and Apple. Features such as forward secrecy, session tickets, and application-layer protocol negotiation (ALPN) enable interoperability with protocols including HTTP/2 and QUIC used by Google LLC and Cloudflare.
TLS supports algorithms for key exchange, bulk encryption, and message authentication, with cryptographic primitives provided by libraries like OpenSSL, BoringSSL, LibreSSL, and GnuTLS. Key exchange methods include Diffie–Hellman variants, elliptic curve Diffie–Hellman promoted by standards bodies such as ISO and IETF, and RSA key exchange formerly used in deployments by Oracle and IBM. Cipher suites specify combinations such as AES-GCM or ChaCha20-Poly1305 for bulk encryption and HMAC-SHA or AEAD constructions for integrity; algorithm choices are influenced by research groups at NIST and academic centers like University of Cambridge and ETH Zurich. Certificate management involves issuance by certificate authorities like Entrust and revocation mechanisms such as CRL and OCSP used by Mozilla and Microsoft trust stores.
TLS has been subject to classed attacks and implementation flaws revealed by researchers at institutions like Google Research, Microsoft Research, Princeton University, CWI Amsterdam, and security firms including Qualys, CrowdStrike, and Mandiant. Notable attack classes include protocol downgrade attacks exploited in incidents involving FREAK and POODLE advisories, side-channel exposures such as Bleichenbacher attack variants analyzed at Stanford University, and implementation bugs like those reported in Heartbleed that affected OpenSSL and service providers including Amazon Web Services and GitHub. Operational defenses involve deprecating weak ciphers, enforcing TLS 1.2+ or TLS 1.3, and deploying certificate transparency services advocated by Google and monitored by organizations like EFF.
Implementations of TLS appear across web servers (e.g., Apache HTTP Server, nginx, Microsoft IIS), client applications (e.g., Mozilla Firefox, Google Chrome, Apple Safari), mail servers (e.g., Postfix, Exim), and embedded systems from vendors such as Cisco Systems and Juniper Networks. Cloud providers including Amazon Web Services, Microsoft Azure, Google Cloud Platform, and content delivery providers such as Akamai Technologies and Cloudflare offer managed TLS features like automated certificate issuance, edge termination, and TLS policies. Open-source stacks like OpenSSL, BoringSSL, LibreSSL, and GnuTLS enable custom deployments by projects such as Docker, Kubernetes, NGINX, Inc., and HashiCorp.
TLS specifications and versioning are governed through Internet Engineering Task Force RFCs and working groups with milestones shaped by inputs from vendors including Google, Microsoft, Apple, Mozilla, and standards organizations like ETSI. Major published versions include those standardized following work by IETF to replace SSL with TLS 1.0, then revisions culminating in TLS 1.2 and TLS 1.3; interoperability testing and certification programs involve entities such as Mozilla and Qualys SSL Labs. Ongoing evolution intersects with transport innovations like QUIC standardized by IETF and web protocol efforts at World Wide Web Consortium impacting adoption across platforms maintained by Google, Apple, Microsoft, and major internet services.
Category:Network security protocols