7.2k views
3 votes
Short response!!

Which protocol would you use to send information over an encrypted server? Explain your selection.

User Kedner
by
6.9k points

2 Answers

7 votes

Answer:

I would select TLS protocol i.e. Transport Layer Security protocol.

Step-by-step explanation:

A commonly used protocol for sending information over an encrypted server is the Secure Sockets Layer (SSL) or its successor, the Transport Layer Security (TLS) protocol.

TLS is widely adopted and provides secure communication by establishing an encrypted link between a client and a server, ensuring that the data being transmitted cannot be intercepted or modified by third parties. It uses a combination of public key and symmetric key cryptography to provide encryption and authentication.

I would select TLS because it is an industry-standard protocol and has been extensively tested and reviewed by the security community, which helps to ensure that it is secure and provides robust protection for transmitted data. Additionally, most web browsers and servers have built-in support for TLS, making it a convenient and accessible option for secure communication over the internet.

User Mark Seaborn
by
6.7k points
5 votes

Answer:

Step-by-step explanation:

For sending information over an encrypted server, the most commonly used protocol is the Secure Sockets Layer (SSL) and its successor, the Transport Layer Security (TLS) protocol.

TLS provides encryption and authentication for secure communication over the internet, ensuring that the data transmitted between a client and a server is protected from eavesdropping and tampering. It operates at the transport layer of the OSI model and can be used by a wide range of applications, including web browsers, email clients, instant messaging applications, and many others.

The selection of SSL/TLS is based on the fact that it is widely supported by various platforms, is well-established and tested, and has been designed to provide strong encryption and authentication for secure communication over the internet. It is also regularly updated to address newly discovered security vulnerabilities and provides a way to negotiate encryption algorithms and authentication methods between the client and the server, allowing for flexibility and interoperability.

User Yigitozmen
by
7.5k points