Understanding SSL and TLS
The internet is the backbone of how we work, shop and communicate, but that means there is a lot of data travelling
to and from computers all over the world, much of it sensitive in nature. This data must be secured to prevent
people from intercepting it, stealing or modifying the data to use in criminal activity.
What does SSL or TLS Mean?
The protection used is known as encryption, and SSL and TLS are the most common encryption protocols used to
accomplish that. SSL is short for secure socket layer, while TLS refers to transport layer security, and are
distinct security protocols that encrypt data at one computer or server, then decrypt it at the other end, so data
transmission is seamless, but when in transit, the data is meaningless if intercepted.
How do SSL/TLS work?
There are three stages to form a secure connection between two devices, these take place during what is known as the
‘handshake’, as follows:
Identification — The client requests ID from the server and in return is presented with the
SSL/TLS
certificate to confirm it is the genuine device.
Key Exchange — The two parties choose an appropriate encryption standard and exchange keys for
encoding and decoding to create a secure connection.
Secure Communications — Once that secure connection is established, all data transmitted
between the
two devices is fully encrypted, and cannot be read even if intercepted.
Asymmetric and Symmetric Encryption
Both systems use a combination of asymmetric and symmetric encryption to provide extremely robust security on all
data.
Asymmetric encryption is used for the initial handshake between the two communication devices and to carry out the
secure key exchange to maximize security during this key process.
After that, security switches to Symmetric Encryption for faster data transfer while maintaining security. This
approach ensures that security and performance of data transfers are both maximized.
Practical use of SSL/TLS
One example of how this works in practice is in the collection and use of sensitive vehicle data for use in fleet
management applications. AutoPi devices
use SSL/TSL encryption protocols to send telemetry data to
the
cloud. In
this way, the system maintains integrity, with no chance of data such as vehicle location being intercepted or
altered.
Device/Application
Use Case
Security Protocol
Benefit
AutoPi Device
Secure communication over MQTT for telemetry
SSL/TLS
Encrypts data, preventing interception and tampering
-
Transmitting vehicle data to the cloud
-
Preserves confidentiality and integrity of data
-
Receiving updates from cloud services
-
Ensures data exchanged remains secure
Conclusion
There is no doubt that SSL/TLS are essential in the modern world. Data is becoming more valuable, and the ability to
send it to other devices is crucial for many industries. Automotive monitoring solutions, healthcare and the
financial industry among many more require private, valuable data to be transmitted, and without SSL/TLS, these
industries and more would find it difficult to function.