Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

TLS (Transport Layer Security)

A cryptographic protocol that provides secure communication over a network by encrypting data in transit between two parties.

Transport Layer Security (TLS) is a cryptographic protocol that encrypts communication between two networked systems, ensuring that data exchanged between a client and server remains confidential and unaltered during transit. TLS is the successor to SSL (Secure Sockets Layer) and is the protocol behind the padlock icon in web browsers. Every HTTPS connection relies on TLS to protect sensitive information like login credentials, payment details, and personal data from interception.

How It Works

A TLS connection begins with a handshake between the client and server. During this handshake, the two parties agree on a protocol version and cipher suite, the server presents its digital certificate for verification, and both sides generate session keys for encrypting the actual data. Modern TLS 1.3 completes this handshake in a single round trip, significantly reducing latency compared to earlier versions.

The server's certificate plays a critical role in establishing trust. It is issued by a Certificate Authority (CA) and contains the server's public key along with identity information. The client verifies the certificate chain against its trusted CA store, checks that the certificate has not expired or been revoked, and confirms that the hostname matches. If any of these checks fail, the client warns the user or terminates the connection.

Once the handshake completes, all data flows through an encrypted channel using the negotiated symmetric cipher. TLS 1.3 removed support for older, insecure algorithms and only permits forward-secret key exchanges. This means that even if a server's private key is later compromised, previously recorded traffic cannot be decrypted.

Why It Matters

Misconfigurations in TLS are a common finding in security assessments. Servers running outdated protocol versions like TLS 1.0 or 1.1, supporting weak cipher suites, or presenting expired certificates all create exploitable weaknesses. Attackers on the same network can perform downgrade attacks or exploit known protocol vulnerabilities to intercept traffic. Proper TLS configuration is a foundational security control that protects every other layer of the application.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment