
SSL/TLS Under Lock and Key
A Guide to Understanding SSL/TLS Cryptography
- English
- ePUB (mobile friendly)
- Available on iOS & Android
SSL/TLS Under Lock and Key
A Guide to Understanding SSL/TLS Cryptography
About this book
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
- Symmetric vs Asymmetric cryptography
- One-Way functions
- Digital Signatures
- Key Generation
- History and Context
The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as:
- Generating a signing request for a certificate (CSR)
- Generating a self-signed certificate (and when it is safe to do or not do so)
- Converting certificates between different formats including java keystores
- Configuring servers to meet best practices, not in a vacuum, but for thesecurity and compatibility needs of your business vertical.
Are you a systems administrator just starting out? A developer looking to not just implement, but to understand?Or perhaps SSL/TLS has been a topic you've avoided over the years because it is very dense and implementation can be fraught with fidgety pitfalls. You can read this book cover to cover, crosswalk to the copiously linked RFCs, or use it as a desk reference.
This is SSL/TLS for everyone.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1
SSL, TLS and Cryptography
Cryptography
The Caesar Cipher
| A | = | X | H | = | E | O | = | L | V | = | S |
| B | = | Y | I | = | F | P | = | M | W | = | T |
| C | = | Z | J | = | G | Q | = | N | X | = | U |
| D | = | A | K | = | H | R | = | O | Y | = | V |
| E | = | B | L | = | I | S | = | P | Z | = | W |
| F | = | C | M | = | J | T | = | Q | |||
| G | = | D | N | = | K | U | = | R |
| I | L | O | V | E | C | R | Y | P | T | O | G | R | A | P | H | Y | ||
| F | I | L | S | B | Z | O | V | M | Q | L | D | O | X | M | E | V |
While cryptographic systems vary in complexity, scale and design, cryptographers have agreed upon a set of standard terms. Some of these terms are:
“Plaintext” is the original message, unaltered. “Ciphertext” refers to the encoded message. “Encryption” is the act of converting plaintext into ciphertext, and “Decryption” is the act of converting a ciphertext back into plaintext by putting the cipher through its paces in reverse.
Symmetric Cryptography

Symmetric Cryptography is also commonly known as a “shared secret”.
| Pros | It is extremely fast. Key management is very simple — there is only one key to manage. |
| Cons | As everyone shares the same key, it’s impossible to figure out who’s who in a conversation. At times, knowing who’s who is really important, and being able to do it is referred to in cryptography as “non-repudiation”. |
The number of possible keys is referred to as the “keyspace”. Ideally the keyspace should be large enough to deter anyone from attempting a Brute Force Attack, which is when every possible key is easily tested until the correct one is discovered.
Asymmetric Cryptography

| Pros | It inherently identifies parties uniquely. It can be put to use immediately — you can share a public key with anyone. |
| Cons | It’s slow. It requires more work administratively to manage keys. Without third party verification, there is no guarantee that the public key belongs to the person who you expect. You could be encrypting messages that can only be decrypted by an attacker! |
SSL/TLS: The Best of Both Worlds
SSL stands for “Secure Sockets Layer”
TLS stands for “Transport Layer Security”
Table of contents
- Introduction: Scope and Audience
- Chapter 1: SSL, TLS and Cryptography
- Chapter 2: Common Protocols
- Chapter 3: Public Key Infrastructure
- Chapter 4: X.509 Certificates
- Chapter 5: Vulnerabilities and Flaws
- Chapter 6: Implementation
- Chapter 7: OpenSSL
- Chapter 8: HTTP/2 and HTTP/3
- Chapter 9: Quick-Start Configuration
- Conclusion