229k views
12 votes
There may be up to three types of security algorithms to enforce encryption and integrity in TLS. These relate to

User Tchevrier
by
5.5k points

1 Answer

5 votes

Answer:

key exchange, encryption and secure hash.

Step-by-step explanation:

TLS is an acronym for Transport Layer Security and it is a cryptographic protocol that provides authentication, privacy and data integrity on a network, usually over the internet.

Simply stated, TLS is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, TLS is a standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. TLS is an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

There are three (3) types of security algorithms to enforce encryption and integrity in TLS. This includes;

I. Key exchange.

II. Encryption.

III. Secure hash.

User Kiven
by
5.5k points