SSL stands for Secure Socket Layer, and all HTTPS communications are essentially based on SSL tunnel established per SSL certificates. SSL certificates are issued by CAs (Certificate Authorities like GoDaddy) for specific web site (like www.Intelicosmos.com which we are hosting in IIS).
With a SSL certificate will be installed in a web site and with SSL certificate, there is a Private and Public keys which are generated by a CA. When a service in a web site is requested by a user in a form of HTTPS, the browser seeks for a SSL certificate from the web site and if available, requests a verification to the CA issued the certificate and if verified, then browser shows a green padlock on the tab and starts establishing a SSL tunnel between its Tab and the web site.
Also a green padlock is shown in Tab indicating the Web Site and certificates are trustable. If Private Key is stolen or a hacker generated it through very complex math calculations (very hard for sure but not impossible), then SSL tunnel is no longer secure and hacker can sniff whatever data moving through the tunnel.
It starts with a Tab hit by a user, then:
1- Browser requests for SSL certificate from the web site
2- Once received the certificates, browser requests to CA to verify
3 – If verified, browser shows a green padlock on the Tab , then generates a static Symmetric key for that Tab, encrypts it with web site’s Public key and shares it with web site. Web site will decrypt it by its Private key
4- Once Symmetric Key handshaking is completed, SSL tunnel is essentially established between a Tab and web site
While SSL is the world’s current most secure HTTP communication pattern and all browsers are heavily relying on SSL certificates, SSL certificates are vulnerable, due to a simple reason: they (SSL certificates) are static!
SSL tunnel is a secure tunnel between a browser’s Tab and a web site, no matter how many web services (like Intelicosmos website, RSSL demo web API, RSSL demo web APP etc) are running under that web site. That means, a compromised SSL certificate is a big issue for all web services running under that web site.
SSL certificates are not fit to scale or are not a good fit for some industry use cases, like:
Before we explain the RSSL, let's strat with definition of Endpoint. An Endpoint is one of below:
Unlike SSL tunnel which established between a browser's Tab and a web site, RSSL tunnel is established between two Endpoints.
More about RSSL:
Bear in mind that, RSSL tunnels can be established with or without SSL tunnels, but when SSL tunnels are available which is our recommendation also, you will get an ultimate security.
If we imported/referenced SDKs into two endpoints, as soon as two endpoints are up (like a webpage is requested by a user), they will automatically generate certificates and symmetric key and handshake. With simple as this, RSSL tunnel is established
RSSL certificates are not static and instead, they are real-time, rotating and in-memory generated, therefore the chance of being hacked is near to zero
Endpoints can be programmed in different languages (and use their equivalent RSSL SDK), for example, one in JavaScript and another in C#, and SDKs are compatible and are able to work with each other, so existing apps as well as new apps are all supported
As RSSL certificates (therefore Public, Private & Symmetric keys) are all dynamic, have a short lifecycle and are circulated between two Endpoints only, a lot of dependencies to expensive HSM or Key Management can be easily replaced by RSSL
Here is the instruction on how to use RSSL:
And here is a video that explains all above with a real demo of RSSL implementation:
Intelicosmos® has already developed RSSL SDKs for common languages like JavaScript, C#, Java, Python and Node.JS to help organizations in improving security of their current endpoints or producing new highly secure endpoints. For more details, refer to RSSL Plans
In Intelicosmos®, we are really keen to help organizations to come up with a better position in their future journey.