SEOMining SEOMining

Ecommerce Implementation  «Prev  Next»
Lesson 10 SSL transactions
ObjectiveDescribe the SSL protocol and its use in secure communications.

SSL Transactions (Secure Communications)

You now understand certificates. Enterprise-grade Web servers allow you to use certificates for authentication and SSL encryption. The SSL protocol allows applications to exchange data over public networks privately, preventing eavesdropping, tampering, and message forgery. SSL enables two applications to communicate over the network using authentication with digital certificates. In addition, message reliability is ensured with SSL's use of encryption and message digests.
When using the SSL protocol, the top-level sequence of events is:
  1. The client and server applications using the asymmetric keys in the form of certificates are authenticated.
  2. A random symmetric session key is encrypted to the server's public key and transmitted to the server.
  3. All data is encrypted using the random symmetric key.
  4. A message authentication that has an algorithm is applied to envelop all information to ensure integrity.
The SSL specification details the data structures, client/server handshake protocol, certificate and key exchange procedures, messages, constants, and so on. It is not necessary to know all the internal details to use the SSL protocol.


SSL encrypts communications between two points. It is not as ambitious as SET, which outlines a more ambitious information exchange procedure in addition to encryption. Although SSL helps prevent eavesdropping from hackers, it is not completely secure. Most nations have embraced the use of SSL, but e-commerce will likely move to protocols such as SET or radically improved uses of SSL to ensure that customers feel completely secure about transacting online.
The following slideshow demonstrates the latest in SSL protocol technologies
An SSL connection can be in two phases, as shown in the FlipBook below.
SSL Connection1
1) SSL Connection1
SSL Connection2
2) SSL Connection2
SSL Connection3
3) SSL Connection3
SSL Connection4
4) SSL Connection4
SSL Connection5
5) SSL Connection5
SSL Connection6
6) SSL Connection6
SSL Connection7
7) SSL Connection7

SSL Connection
  1. For more information about SSL, go to
  2. For more information about cryptography in general, go to
The next lesson will cover the SET protocol.