Understanding SSL and TLS
 
    The internet is the backbone of how we work, shop and communicate, but that means there is a lot of data travelling
    to and from computers all over the world, much of it sensitive in nature. This data must be secured to prevent
    people from intercepting it, stealing or modifying the data to use in criminal activity.
    What does SSL or TLS Mean?
 
    The protection used is known as encryption, and SSL and TLS are the most common encryption protocols  used to
    accomplish that. SSL is short for secure socket layer, while TLS refers to transport layer security, and are
    distinct security protocols that encrypt data at one computer or server, then decrypt it at the other end, so data
    transmission is seamless, but when in transit, the data is meaningless if intercepted.
    How do SSL/TLS work?
 
    There are three stages to form a secure connection between two devices, these take place during what is known as the
    ‘handshake’, as follows:
    
        
            Identification  — The client requests ID from the server and in return is presented with the
            SSL/TLS
            certificate to confirm it is the genuine device.
        
     
    
        
            Key Exchange  — The two parties choose an appropriate encryption standard and exchange keys for
            encoding and decoding to create a secure connection.
        
     
    
        
            Secure Communications  — Once that secure connection is established, all data transmitted
            between the
            two devices is fully encrypted, and cannot be read even if intercepted.
        
     
 
    Asymmetric and Symmetric Encryption
 
    Both systems use a combination of asymmetric and symmetric encryption to provide extremely robust security on all
    data.
    Asymmetric encryption is used for the initial handshake between the two communication devices and to carry out the
    secure key exchange to maximize security during this key process.
    After that, security switches to Symmetric Encryption for faster data transfer while maintaining security. This
    approach ensures that security and performance of data transfers are both maximized.
    Practical use of SSL/TLS
 
    One example of how this works in practice is in the collection and use of sensitive vehicle data  for use in fleet
        management  applications. AutoPi devices 
    use SSL/TSL encryption protocols to send telemetry data  to
    the
    cloud. In
    this way, the system maintains integrity, with no chance of data such as vehicle location being intercepted or
    altered.
  
    
      
        
          Device/Application 
          Use Case 
          Security Protocol 
          Benefit 
         
       
      
        
          AutoPi Device 
          Secure communication over MQTT for telemetry  
          SSL/TLS 
          Encrypts data, preventing interception and tampering 
         
        
          — 
          Transmitting vehicle data to the cloud 
          — 
          Preserves confidentiality and integrity of data 
         
        
          — 
          Receiving updates from cloud services 
          — 
          Ensures data exchanged remains secure 
         
       
    
   
 
    Conclusion
 
    There is no doubt that SSL/TLS are essential in the modern world. Data is becoming more valuable, and the ability to
    send it to other devices is crucial for many industries. Automotive monitoring solutions, healthcare and the
    financial industry among many more require private, valuable data to be transmitted, and without SSL/TLS, these
    industries and more would find it difficult to function.