


Application Data: This protocol ensures that messages are fragmented, compressed, encrypted and transmitted in a secure manner.The change cipher spec message, transmitted by both the client and the server, defines the re-negotiated cipher spec and keys that will be used for all the messages exchanged henceforth. Change Cipher Spec: It defines changes in ciphering strategies.It is used to notify the peer of any error condition that has occurred. Alert: This sub-protocol defines the alert levels and provides a description of the alerts.The higher layer consists of the following sub-protocols:.

Transmitting the data from the upper application layer to the lower transport layer and vice versa.
#Using two keylight 1.2 keys on same layer code
#Using two keylight 1.2 keys on same layer update
TLS has gone through two iterations, RFC 4346 (TLS 1.1) and RFC 5246 (TLS 1.2), with the latest update TLS 1.3 being a working draft. TLS evolved from SSL protocol (SSL 3.0) that is no longer considered secure vulnerabilities such as POODLE attack has demonstrated this. By providing a secure channel of communication between two peers, TLS protocol protects the integrity of the message and ensures it is not being tampered. The primary goal of the Transport Layer Security protocol as defined in RFC 2246 (TLS version 1.0) is “to provide privacy and data integrity between two communicating applications.” The TLS protocol ensures this by encrypting data so that any third party is unable to intercept the communication it also authenticates the peers to verify their identity.
