UNCORRECTED PROOF Handshake Comparison Between TLS V 1.2 and TLS V 1.3 Protocol Abhay Pratap Singh and Mahendra Singh 1 Introduction 0 The benefits of the Internet include easy retrieval of information, communication, 1 Internet banking, e-commerce, and several others, enhancing living standards. Simul- 2 taneously, the Internet also has some shortcomings as much as its advantages. With 3 the increasing development of cyber security threats to provide Web communications 4 security and wireless cellular networks over the Internet has grown to be a significant 5 concern in the digital era [1, 2]. The sensor network security is essential for trans- 6 ferring reliable data from sensor devices to distant sinks and maintaining network 7 availability [3]. The data transmission between two entities must be carefully secured 8 and protected while they are communicating across unsecured networks or unpro- 9 tected networks. For this purpose, the SSL/TLS protocol provides the mechanism 10 to protect the Internet traffic during data transmission. The TLS protocol is one of 11 the most popular enciphered communication protocol among the Internet [4]. The 12 TLS protocol facilitates the Web-client and Web-server to verify both sides to nego- 13 tiate to encipher algorithms and cryptographic keys in the handshake process before 14 retrieving essential information over the Web [ 5]. Today, almost 75% of all Web appli- 15 cation requests are secured and protected utilizing the TLS encipher-based methods 16 [6]. It is also utilized by other Internet protocols, including IMAP (Internet Message 17 Access Protocol) or SMTP (Simple Mail Transfer Protocol) (email communication), 18 HTTP or HTTPs (Hypertext Transfer Protocol or Secure) (Web communication), 19 and LDAP (Lightweight Directory Access Protocol) (for accessing directories) [7]. 20 Applications running on computer devices, servers, and mobile phones heavily rely 21 on it [8]. The TLS protocol devised to deliver network security features for protocols 22 operating on the application layer. TLS works across transport layer protocols, as 23 A. P. Singh (B ) · M. Singh Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, India e-mail: rs.abhaypratapsingh@gkv.ac.in © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 R. Agrawal et al. (eds.), Cyber Security in Intelligent Computing and Communications, Studies in Computational Intelligence 1007, https://doi.org/10.1007/978-981-16-8012-0_12 143 520912_1_En_12_Chapter TYPESET DISK LE CP Disp.:2/2/2022 Pages: 155 Layout: T1-Standard