UNCORRECTED PROOF
Handshake Comparison Between TLS V
1.2 and TLS V 1.3 Protocol
Abhay Pratap Singh and Mahendra Singh
1 Introduction 0
The benefits of the Internet include easy retrieval of information, communication, 1
Internet banking, e-commerce, and several others, enhancing living standards. Simul- 2
taneously, the Internet also has some shortcomings as much as its advantages. With 3
the increasing development of cyber security threats to provide Web communications 4
security and wireless cellular networks over the Internet has grown to be a significant 5
concern in the digital era [1, 2]. The sensor network security is essential for trans- 6
ferring reliable data from sensor devices to distant sinks and maintaining network 7
availability [3]. The data transmission between two entities must be carefully secured 8
and protected while they are communicating across unsecured networks or unpro- 9
tected networks. For this purpose, the SSL/TLS protocol provides the mechanism 10
to protect the Internet traffic during data transmission. The TLS protocol is one of 11
the most popular enciphered communication protocol among the Internet [4]. The 12
TLS protocol facilitates the Web-client and Web-server to verify both sides to nego- 13
tiate to encipher algorithms and cryptographic keys in the handshake process before 14
retrieving essential information over the Web [ 5]. Today, almost 75% of all Web appli- 15
cation requests are secured and protected utilizing the TLS encipher-based methods 16
[6]. It is also utilized by other Internet protocols, including IMAP (Internet Message 17
Access Protocol) or SMTP (Simple Mail Transfer Protocol) (email communication), 18
HTTP or HTTPs (Hypertext Transfer Protocol or Secure) (Web communication), 19
and LDAP (Lightweight Directory Access Protocol) (for accessing directories) [7]. 20
Applications running on computer devices, servers, and mobile phones heavily rely 21
on it [8]. The TLS protocol devised to deliver network security features for protocols 22
operating on the application layer. TLS works across transport layer protocols, as 23
A. P. Singh (B ) · M. Singh
Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, India
e-mail: rs.abhaypratapsingh@gkv.ac.in
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022
R. Agrawal et al. (eds.), Cyber Security in Intelligent Computing and Communications,
Studies in Computational Intelligence 1007,
https://doi.org/10.1007/978-981-16-8012-0_12
143
520912_1_En_12_Chapter TYPESET DISK LE CP Disp.:2/2/2022 Pages: 155 Layout: T1-Standard