{"id":161452,"date":"2025-02-11T10:24:52","date_gmt":"2025-02-11T03:24:52","guid":{"rendered":"https:\/\/it.telkomuniversity.ac.id\/memahami-keamanan-internet-dengan-protokol-ssl\/"},"modified":"2025-02-11T10:24:53","modified_gmt":"2025-02-11T03:24:53","slug":"what-is-ssl","status":"publish","type":"post","link":"https:\/\/it.telkomuniversity.ac.id\/en\/what-is-ssl\/","title":{"rendered":"SSL: Function and How It Works as a Security Protocol"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>SSL is a Secure Sockets Layer security protocol that is able to securely protect the connection between servers and clients on the internet.\u00a0<\/strong><\/p>\n<h2 data-start=\"51\" data-end=\"74\"><strong data-start=\"56\" data-end=\"72\">What is SSL<\/strong><\/h2>\n<p data-start=\"76\" data-end=\"605\">SSL stands for <strong data-start=\"91\" data-end=\"115\">Secure Sockets Layer<\/strong>. It is a security protocol equipped with an encryption process to establish a secure connection between a server and a client on the internet. SSL is also known as <strong data-start=\"280\" data-end=\"314\">Transport Layer Security (TLS)<\/strong>, commonly integrated with an application to protect transmitted data. SSL\/TLS is called through a web server that uses <strong data-start=\"434\" data-end=\"443\">HTTPS<\/strong> or <strong data-start=\"447\" data-end=\"464\">HTTP over TLS<\/strong>. Although SSL has been replaced by <strong data-start=\"500\" data-end=\"534\">Transport Layer Security (TLS)<\/strong>, the term <strong data-start=\"545\" data-end=\"552\">SSL<\/strong> is still commonly used to refer to both protocols.<\/p>\n<p data-start=\"607\" data-end=\"1026\">Applications that support <strong data-start=\"633\" data-end=\"644\">SSL\/TLS<\/strong> are typically designed to provide <strong data-start=\"679\" data-end=\"704\">server authentication<\/strong> via digital certificates (SSL<span class=\"\">\u00a0certificate)<\/span>, facilitate <strong data-start=\"742\" data-end=\"758\">key exchange<\/strong> using a <strong data-start=\"767\" data-end=\"788\">public key system<\/strong>, and ensure <strong data-start=\"801\" data-end=\"825\">data confidentiality<\/strong> through session keys protected by <strong data-start=\"860\" data-end=\"908\">standard symmetric key encryption algorithms<\/strong>, such as <strong data-start=\"918\" data-end=\"925\">AES<\/strong>. Additionally, <strong data-start=\"941\" data-end=\"962\">message integrity<\/strong> is validated through the use of message authentication codes.<\/p>\n<p data-start=\"1028\" data-end=\"1414\">The SSL\/TLS<strong data-start=\"1032\" data-end=\"1047\">\u00a0process<\/strong> begins when the <strong data-start=\"1064\" data-end=\"1074\">client<\/strong> sends a connection request to an SSL-protected server. The <strong data-start=\"1134\" data-end=\"1155\">server and client<\/strong> then perform a series of negotiations and exchange <strong data-start=\"1207\" data-end=\"1231\">digital certificates (<\/strong><span class=\"\">ssl certificate)<\/span><\/p>\n<p data-start=\"1028\" data-end=\"1414\">to verify each other\u2019s identity. Once the identity verification is successful, a <strong data-start=\"1313\" data-end=\"1338\">unique encryption key<\/strong> is established to secure communication between the <strong data-start=\"1390\" data-end=\"1411\">server and client<\/strong>.<\/p>\n<p data-start=\"1416\" data-end=\"1780\">Using SSL\/TLS\u00a0is crucial in situations such as <strong data-start=\"1463\" data-end=\"1535\">online transactions, sensitive data exchanges, secure account logins<\/strong>, or whenever <strong data-start=\"1549\" data-end=\"1578\">privacy and data security<\/strong> are a priority. For example, when you access a website that has the <strong data-start=\"1647\" data-end=\"1658\">&#8220;https&#8221;<\/strong> protocol in its URL, it indicates that the site uses <strong data-start=\"1712\" data-end=\"1723\">SSL\/TLS<\/strong> to maintain <strong data-start=\"1736\" data-end=\"1760\">security and privacy<\/strong> in communication.<\/p>\n<p data-start=\"1416\" data-end=\"1780\">\n<h2 data-start=\"1787\" data-end=\"1817\"><strong data-start=\"1791\" data-end=\"1815\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-146444 size-full\" title=\"SSL Meaning\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/02\/SSL-adalah.png\" alt=\"SSL Meaning\" width=\"751\" height=\"376\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/02\/SSL-adalah.png 751w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/02\/SSL-adalah-300x150.png 300w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/02\/SSL-adalah-255x128.png 255w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/>Functions<\/strong><\/h2>\n<p data-start=\"1819\" data-end=\"2019\">The <strong data-start=\"1823\" data-end=\"1870\">main function of SSL (Secure Sockets Layer)<\/strong> is to provide <strong data-start=\"1885\" data-end=\"1909\">security and privacy<\/strong> in communication between a <strong data-start=\"1937\" data-end=\"1960\">server and a client<\/strong> on the internet. Below are the <strong data-start=\"1992\" data-end=\"2009\">key functions<\/strong> of SSL:<\/p>\n<h4 data-start=\"2021\" data-end=\"2050\"><strong data-start=\"2026\" data-end=\"2048\">1. Data Encryption<\/strong><\/h4>\n<p data-start=\"2051\" data-end=\"2302\">One of SSL\/TLS primary functions is to <strong data-start=\"2088\" data-end=\"2099\">encrypt<\/strong> data transmitted between the <strong data-start=\"2129\" data-end=\"2150\">server and client<\/strong>. This encryption process converts the data into an unreadable format, ensuring that unauthorized parties cannot access or manipulate the information.<\/p>\n<h4 data-start=\"2304\" data-end=\"2332\"><strong data-start=\"2309\" data-end=\"2330\">2. Authentication<\/strong><\/h4>\n<p data-start=\"2333\" data-end=\"2647\">SSL\/TLS facilitates <strong data-start=\"2349\" data-end=\"2367\">authentication<\/strong> between the <strong data-start=\"2380\" data-end=\"2401\">server and client<\/strong>, meaning that both parties can verify each other\u2019s identity. This ensures that communication occurs between <strong data-start=\"2510\" data-end=\"2533\">legitimate entities<\/strong>. Authentication is performed using <strong data-start=\"2569\" data-end=\"2593\">digital certificates (SSL <\/strong><span class=\"\">certificate) <\/span><span style=\"font-size: revert; color: initial;\">issued by a <\/span><strong style=\"font-size: revert; color: initial;\" data-start=\"2606\" data-end=\"2644\">trusted certificate authority (CA)<\/strong><span style=\"font-size: revert; color: initial;\">.<\/span><\/p>\n<h4 data-start=\"2649\" data-end=\"2677\"><strong data-start=\"2654\" data-end=\"2675\">3. Data Integrity<\/strong><\/h4>\n<p data-start=\"2678\" data-end=\"2957\">SSL ensures <strong data-start=\"2690\" data-end=\"2708\">data integrity<\/strong>, meaning that data transmitted via an <strong data-start=\"2747\" data-end=\"2765\">SSL connection<\/strong> cannot be altered or manipulated during transmission. Integrity is maintained using <strong data-start=\"2850\" data-end=\"2891\">hash functions and digital signatures<\/strong>, ensuring that the received data is identical to the sent data.<\/p>\n<h4 data-start=\"2959\" data-end=\"3005\"><strong data-start=\"2964\" data-end=\"3003\">4. Protection Against Cyber Attacks<\/strong><\/h4>\n<p data-start=\"3006\" data-end=\"3068\">SSL\/TLS is designed to protect against security threats such as:<\/p>\n<ul data-start=\"3069\" data-end=\"3291\">\n<li data-start=\"3069\" data-end=\"3122\"><strong data-start=\"3071\" data-end=\"3085\">Data theft<\/strong> (e.g., stealing login credentials)<\/li>\n<li data-start=\"3123\" data-end=\"3183\"><strong data-start=\"3125\" data-end=\"3142\">Eavesdropping<\/strong> (intercepting sensitive communication)<\/li>\n<li data-start=\"3184\" data-end=\"3241\"><strong data-start=\"3186\" data-end=\"3204\">Data tampering<\/strong> (altering transmitted information)<\/li>\n<li data-start=\"3242\" data-end=\"3291\"><strong data-start=\"3244\" data-end=\"3256\">Spoofing<\/strong> (impersonating a trusted entity)<\/li>\n<\/ul>\n<p data-start=\"3293\" data-end=\"3394\">By using <strong data-start=\"3302\" data-end=\"3323\">strong encryption<\/strong> and <strong data-start=\"3328\" data-end=\"3357\">authentication mechanisms<\/strong>, this protocol helps mitigate these attacks.<\/p>\n<h4 data-start=\"3396\" data-end=\"3445\"><strong data-start=\"3401\" data-end=\"3443\">5. Compatibility with Web Applications<\/strong><\/h4>\n<p data-start=\"3446\" data-end=\"3743\">SSL\/TLS enables websites to use <strong data-start=\"3474\" data-end=\"3520\">HTTPS (HyperText Transfer Protocol Secure)<\/strong>, which indicates a <strong data-start=\"3540\" data-end=\"3561\">secure connection<\/strong>. This gives users confidence that their data is protected when interacting with a website, such as during <strong data-start=\"3668\" data-end=\"3688\">online purchases<\/strong> or when filling out forms with personal information.<\/p>\n<p data-start=\"3446\" data-end=\"3743\">\n<p data-start=\"3446\" data-end=\"3743\"><strong>Also Read : <a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/what-is-telnet\/\" target=\"_blank\" rel=\"noopener\">What is Telnet<\/a><\/strong><\/p>\n<p data-start=\"3446\" data-end=\"3743\">\n<h2 data-start=\"3750\" data-end=\"3795\"><strong data-start=\"3754\" data-end=\"3793\">Advantages and Disadvantages<\/strong><\/h2>\n<h3 data-start=\"3797\" data-end=\"3825\"><strong data-start=\"3802\" data-end=\"3823\">Advantages<\/strong><\/h3>\n<ol data-start=\"3826\" data-end=\"4229\">\n<li data-start=\"3826\" data-end=\"3936\"><strong data-start=\"3829\" data-end=\"3846\">Data Security<\/strong> \u2013 Provides <strong data-start=\"3858\" data-end=\"3879\">strong encryption<\/strong>, protecting transmitted data from unauthorized access.<\/li>\n<li data-start=\"3937\" data-end=\"4095\"><strong data-start=\"3940\" data-end=\"3958\">Authentication<\/strong> \u2013 Verifies the identities of communicating parties using <strong data-start=\"4016\" data-end=\"4040\"><strong data-start=\"4016\" data-end=\"4040\">digital certificates (ssl certificate) <\/strong><\/strong>issued by <strong data-start=\"4051\" data-end=\"4092\">trusted certificate authorities (CAs)<\/strong>.<\/li>\n<li data-start=\"4096\" data-end=\"4229\"><strong data-start=\"4099\" data-end=\"4117\">Data Integrity<\/strong> \u2013 Ensures data remains <strong data-start=\"4141\" data-end=\"4154\">unchanged<\/strong> during transmission using <strong data-start=\"4181\" data-end=\"4199\">hash functions<\/strong> and <strong data-start=\"4204\" data-end=\"4226\">digital signatures<\/strong>.<\/li>\n<\/ol>\n<h3 data-start=\"4231\" data-end=\"4262\"><strong data-start=\"4236\" data-end=\"4260\">Disadvantages<\/strong><\/h3>\n<ol data-start=\"4263\" data-end=\"4744\">\n<li data-start=\"4263\" data-end=\"4399\"><strong data-start=\"4266\" data-end=\"4274\">Cost<\/strong> \u2013 Obtaining and implementing an <strong data-start=\"4307\" data-end=\"4326\">SSL certificate<\/strong> requires a fee, which can be a challenge for <strong data-start=\"4372\" data-end=\"4396\">small website owners<\/strong>.<\/li>\n<li data-start=\"4400\" data-end=\"4550\"><strong data-start=\"4403\" data-end=\"4432\">Authentication Limitation<\/strong> \u2013 This protocol only verifies <strong data-start=\"4453\" data-end=\"4472\">server identity<\/strong>, not the <strong data-start=\"4482\" data-end=\"4492\">client<\/strong>, which can be a security loophole in certain scenarios.<\/li>\n<li data-start=\"4551\" data-end=\"4744\"><strong data-start=\"4554\" data-end=\"4607\">Vulnerability to Man-in-the-Middle (MITM) Attacks<\/strong> \u2013 Although <strong data-start=\"4619\" data-end=\"4626\">SSL<\/strong> is designed to prevent such attacks, <strong data-start=\"4664\" data-end=\"4680\">MITM attacks<\/strong> can still occur if authentication mechanisms are compromised.<\/li>\n<\/ol>\n<p><strong>Also Read : <a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/what-is-isp\/\" target=\"_blank\" rel=\"noopener\">What is ISP (Internet Service Provider)<\/a><\/strong><\/p>\n<h2 data-start=\"4751\" data-end=\"4773\"><strong data-start=\"4755\" data-end=\"4771\">Types<\/strong><\/h2>\n<h4 data-start=\"4775\" data-end=\"4796\"><strong data-start=\"4780\" data-end=\"4794\">1. SSL 2.0<\/strong><\/h4>\n<p data-start=\"4797\" data-end=\"4949\">The first version of <strong data-start=\"4818\" data-end=\"4825\">SSL<\/strong>, but it is no longer considered secure due to multiple vulnerabilities. <strong data-start=\"4898\" data-end=\"4923\">SSL 2.0 is deprecated<\/strong> and should not be used.<\/p>\n<h4 data-start=\"4951\" data-end=\"4972\"><strong data-start=\"4956\" data-end=\"4970\">2. SSL 3.0<\/strong><\/h4>\n<p data-start=\"4973\" data-end=\"5164\">An improved version of <strong data-start=\"4996\" data-end=\"5007\">SSL 2.0<\/strong>, but later found to have security flaws. The <strong data-start=\"5053\" data-end=\"5070\">POODLE attack<\/strong> exposed weaknesses in <strong data-start=\"5093\" data-end=\"5104\">SSL 3.0<\/strong>, making it obsolete. <strong data-start=\"5126\" data-end=\"5161\">SSL 3.0 is also not recommended<\/strong>.<\/p>\n<p data-start=\"5166\" data-end=\"5235\"><em data-start=\"5166\" data-end=\"5233\">Using outdated SSL\/TLS versions can lead to security vulnerabilities.<\/em><\/p>\n<h2 data-start=\"5242\" data-end=\"5262\"><strong data-start=\"5246\" data-end=\"5260\">Conclusion<\/strong><\/h2>\n<p data-start=\"5264\" data-end=\"5573\">SSL is a crucial <strong data-start=\"5281\" data-end=\"5302\">security protocol<\/strong> that protects <strong data-start=\"5317\" data-end=\"5372\">confidentiality, authentication, and data integrity<\/strong> in internet communication. With its <strong data-start=\"5409\" data-end=\"5441\">strong encryption mechanisms<\/strong>, SSL\/TLS ensures that <strong data-start=\"5460\" data-end=\"5508\">data exchanged between a server and a client<\/strong> remains protected from <strong data-start=\"5532\" data-end=\"5570\">hacking attempts and eavesdropping<\/strong>.<\/p>\n<p data-start=\"5575\" data-end=\"5706\">Additionally, <strong data-start=\"5589\" data-end=\"5617\">SSL digital certificates<\/strong> enable reliable authentication, ensuring that users interact with a legitimate server.<\/p>\n<p data-start=\"5708\" data-end=\"6053\" data-is-last-node=\"\">Although SSL\/TLS<strong data-start=\"5717\" data-end=\"5745\">\u00a0has some limitations<\/strong>, such as <strong data-start=\"5755\" data-end=\"5814\">implementation costs and susceptibility to MITM attacks<\/strong>, its benefits in safeguarding <strong data-start=\"5845\" data-end=\"5874\">data security and privacy<\/strong> far outweigh the drawbacks. Therefore, the use of SSL\/TLS<strong data-start=\"5925\" data-end=\"5954\">\u00a0or its successor, TLS<\/strong>, is highly recommended for <strong data-start=\"5982\" data-end=\"6011\">websites and applications<\/strong> that prioritize <strong data-start=\"6028\" data-end=\"6052\">user data protection<\/strong>.<\/p>\n<h2>References<\/h2>\n<p>Pranata, H., Abdillah, L. A., &amp; Ependi, U. (2015). Analisis Keamanan Protokol Secure Socket Layer (SSL) Terhadap Proses Sniffing di Jaringan.\u00a0<i>arXiv preprint arXiv:1508.05457<\/i>.<\/p>\n<p><strong>Author : Hassan Rizky Putra Sailellah | Editor : Meilina Eka Ayuningtyas<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SSL is a Secure Sockets Layer security protocol that is able to securely protect the connection between servers and clients on the internet.\u00a0 What is SSL SSL stands for Secure Sockets Layer. It is a security protocol equipped with an encryption process to establish a secure connection between a server and a client on the [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":146447,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":182,"footnotes":""},"categories":[182,2828,2892],"tags":[2442,3443,3448,3442,3445,3447,3450,3444,3446,3449],"class_list":["post-161452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs-en","category-networking","category-infrastructure","tag-ssl-en","tag-ssl-certificate-2","tag-ssl-checker-2","tag-ssl-encryption-2","tag-ssl-error-2","tag-ssl-free-2","tag-ssl-protocol-2","tag-ssl-security-2","tag-ssl-vpn-2","tag-ssl-vs-tls-2"],"blocksy_meta":[],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts\/161452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/comments?post=161452"}],"version-history":[{"count":0,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts\/161452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media\/146447"}],"wp:attachment":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media?parent=161452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/categories?post=161452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/tags?post=161452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}