. . . . . . . . . . "Transport Layer Security"@sv . "Transport Layer Security"@pt . "TLS (\u0430\u043D\u0433\u043B. Transport Layer Security \u2014 \u0437\u0430\u0445\u0438\u0441\u0442 \u043D\u0430 \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u043D\u043E\u043C\u0443 \u0440\u0456\u0432\u043D\u0456), \u044F\u043A \u0456 \u0439\u043E\u0433\u043E \u043F\u043E\u043F\u0435\u0440\u0435\u0434\u043D\u0438\u043A SSL \u2014 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0456\u0447\u043D\u0438\u0439 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B, \u0449\u043E \u043D\u0430\u0434\u0430\u0454 \u043C\u043E\u0436\u043B\u0438\u0432\u043E\u0441\u0442\u0456 \u0431\u0435\u0437\u043F\u0435\u0447\u043D\u043E\u0457 \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0434\u0430\u043D\u0438\u0445 \u0432 \u0456\u043D\u0442\u0435\u0440\u043D\u0435\u0442\u0456 \u0434\u043B\u044F \u043D\u0430\u0432\u0456\u0433\u0430\u0446\u0456\u0457, \u043E\u0442\u0440\u0438\u043C\u0430\u043D\u043D\u044F \u043F\u043E\u0448\u0442\u0438, \u0441\u043F\u0456\u043B\u043A\u0443\u0432\u0430\u043D\u043D\u044F, \u043E\u0431\u043C\u0456\u043D\u0443 \u0444\u0430\u0439\u043B\u0430\u043C\u0438, \u0442\u043E\u0449\u043E. \u0412\u0438\u043A\u043E\u0440\u0438\u0441\u0442\u043E\u0432\u0443\u0454 \u0430\u0441\u0438\u043C\u0435\u0442\u0440\u0438\u0447\u043D\u0435 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043D\u043D\u044F \u0456 \u0441\u0435\u0440\u0442\u0438\u0444\u0456\u043A\u0430\u0442\u0438 X.509."@uk . . . . . . . . . . . . "\u50B3\u8F38\u5C64\u5B89\u5168\u6027\u5354\u5B9A"@zh . . . . . . . . . . . . . . . . . . "TLS (\u0430\u043D\u0433\u043B. transport layer security \u2014 \u041F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u043D\u043E\u0433\u043E \u0443\u0440\u043E\u0432\u043D\u044F), \u043A\u0430\u043A \u0438 \u0435\u0433\u043E \u043F\u0440\u0435\u0434\u0448\u0435\u0441\u0442\u0432\u0435\u043D\u043D\u0438\u043A SSL (\u0430\u043D\u0433\u043B. secure sockets layer \u2014 \u0441\u043B\u043E\u0439 \u0437\u0430\u0449\u0438\u0449\u0451\u043D\u043D\u044B\u0445 \u0441\u043E\u043A\u0435\u0442\u043E\u0432), \u2014 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043A\u0438\u0435 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u044B, \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0438\u0432\u0430\u044E\u0449\u0438\u0435 \u0437\u0430\u0449\u0438\u0449\u0451\u043D\u043D\u0443\u044E \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0443 \u0434\u0430\u043D\u043D\u044B\u0445 \u043C\u0435\u0436\u0434\u0443 \u0443\u0437\u043B\u0430\u043C\u0438 \u0432 \u0441\u0435\u0442\u0438 \u0418\u043D\u0442\u0435\u0440\u043D\u0435\u0442. TLS \u0438 SSL \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u044E\u0442 \u0430\u0441\u0438\u043C\u043C\u0435\u0442\u0440\u0438\u0447\u043D\u043E\u0435 \u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u0435 \u0434\u043B\u044F \u0430\u0443\u0442\u0435\u043D\u0442\u0438\u0444\u0438\u043A\u0430\u0446\u0438\u0438, \u0441\u0438\u043C\u043C\u0435\u0442\u0440\u0438\u0447\u043D\u043E\u0435 \u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u0435 \u0434\u043B\u044F \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u043E\u0441\u0442\u0438 \u0438 \u043A\u043E\u0434\u044B \u0430\u0443\u0442\u0435\u043D\u0442\u0438\u0447\u043D\u043E\u0441\u0442\u0438 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0439 \u0434\u043B\u044F \u0441\u043E\u0445\u0440\u0430\u043D\u0435\u043D\u0438\u044F \u0446\u0435\u043B\u043E\u0441\u0442\u043D\u043E\u0441\u0442\u0438 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0439."@ru . . . . . . . . . . . . . . . . . . "TLS (ang. Transport Layer Security) \u2013 przyj\u0119te jako standard w Internecie rozwini\u0119cie protoko\u0142u SSL (ang. Secure Socket Layer), zaprojektowanego pierwotnie przez Netscape Communications. TLS zapewnia poufno\u015B\u0107 i integralno\u015B\u0107 transmisji danych, a tak\u017Ce uwierzytelnienie serwera, a niekiedy r\u00F3wnie\u017C klienta. Opiera si\u0119 na szyfrowaniu asymetrycznym oraz certyfikatach X.509. W sierpniu 2018 r. wprowadzono wersj\u0119 1.3 tego protoko\u0142u jako aktualn\u0105. Wed\u0142ug modelu OSI, TLS dzia\u0142a w warstwie prezentacji, dzi\u0119ki czemu mo\u017Ce zabezpiecza\u0107 protoko\u0142y warstwy najwy\u017Cszej \u2013 warstwy aplikacji, np.: telnet, HTTP, gopher, POP3, IMAP, NNTP, SIP."@pl . . . . . . . . "Transport Layer Security (TLS, englisch f\u00FCr Transportschichtsicherheit), auch bekannt unter der Vorg\u00E4ngerbezeichnung Secure Sockets Layer (SSL), ist ein Verschl\u00FCsselungsprotokoll zur sicheren Daten\u00FCbertragung im Internet. TLS besteht aus den beiden Hauptkomponenten TLS Handshake und TLS Record. Im TLS Handshake findet ein sicherer Schl\u00FCsselaustausch und eine Authentifizierung statt. TLS Record verwendet dann den im TLS Handshake ausgehandelten symmetrischen Schl\u00FCssel f\u00FCr eine sichere Daten\u00FCbertragung \u2013 die Daten werden verschl\u00FCsselt und mit einem MAC gegen Ver\u00E4nderungen gesch\u00FCtzt \u00FCbertragen. F\u00FCr den Schl\u00FCsselaustausch sind in den \u00E4lteren TLS-Versionen verschiedene Algorithmen mit unterschiedlichen Sicherheitsgarantien im Einsatz. Die neueste Version TLS 1.3 verwendet allerdings nur noch das Diffie-Hellman-Schl\u00FCsselaustausch Protokoll (DHE oder ECDHE). Dabei wird f\u00FCr jede Verbindung ein neuer Sitzungsschl\u00FCssel (Session Key) ausgehandelt. Da dies ohne Verwendung eines Langzeitschl\u00FCssels geschieht, erreicht TLS 1.3 Perfect Forward Secrecy."@de . "Transport Layer Security (TLS) e il suo predecessore Secure Sockets Layer (SSL) sono dei protocolli crittografici di presentazione usati nel campo delle telecomunicazioni e dell'informatica che permettono una comunicazione sicura dalla sorgente al destinatario (end-to-end) su reti TCP/IP (come ad esempio Internet) fornendo autenticazione, integrit\u00E0 dei dati e confidenzialit\u00E0 operando al di sopra del livello di trasporto. Diverse versioni del protocollo sono ampiamente utilizzate in applicazioni come i browser, l'e-mail, la messaggistica istantanea e il voice over IP. Un esempio di applicazione di SSL/TLS \u00E8 nel protocollo HTTPS."@it . . "SSL (Secure Sockets Layer) eta TLS (Transport Layer Security), Garraio Geruzako Segurtasuna, SSL-ren ondorengoa, Internet-en komunikazio seguruak ezartzeko dira."@eu . . . "La Transport Layer Security (TLS) ou \u00AB S\u00E9curit\u00E9 de la couche de transport \u00BB, et son pr\u00E9d\u00E9cesseur la Secure Sockets Layer (SSL) ou \u00AB Couche de sockets s\u00E9curis\u00E9e \u00BB, sont des protocoles de s\u00E9curisation des \u00E9changes par r\u00E9seau informatique, notamment par Internet. Le protocole SSL a \u00E9t\u00E9 d\u00E9velopp\u00E9 \u00E0 l'origine par Netscape Communications Corporation pour son navigateur Web. L'organisme de normalisation Internet Engineering Task Force (IETF) en a poursuivi le d\u00E9veloppement en le rebaptisant Transport Layer Security (TLS). On parle parfois de SSL/TLS pour d\u00E9signer indiff\u00E9remment SSL ou TLS. La TLS (ou SSL) fonctionne suivant un mode client-serveur. Il permet de satisfaire les objectifs de s\u00E9curit\u00E9 suivants : \n* l'authentification du serveur ; \n* la confidentialit\u00E9 des donn\u00E9es \u00E9chang\u00E9es (ou session chiffr\u00E9e) ; \n* l'int\u00E9grit\u00E9 des donn\u00E9es \u00E9chang\u00E9es ; \n* de mani\u00E8re optionnelle, l'authentification du client (mais dans la r\u00E9alit\u00E9 celle-ci est souvent assur\u00E9e par la couche applicative). Le protocole est tr\u00E8s largement utilis\u00E9, et sa mise en \u0153uvre est facilit\u00E9e par le fait que les protocoles de la couche application, comme le HTTP, n'ont pas \u00E0 \u00EAtre profond\u00E9ment modifi\u00E9s pour utiliser une connexion s\u00E9curis\u00E9e, mais seulement impl\u00E9ment\u00E9s au-dessus de la SSL/TLS, ce qui pour le HTTP a donn\u00E9 le protocole HTTPS. Un groupe de travail sp\u00E9cial de l'IETF a permis la cr\u00E9ation de la TLS et de son \u00E9quivalent en mode non-connect\u00E9 UDP, la DTLS. Depuis qu'il est repris par l'IETF, le protocole TLS a connu quatre versions : TLS v1.0 en 1999, TLS v1.1 en 2006, TLS v1.2 en 2008 et TLS v1.3 en 2018."@fr . . "O Transport Layer Security (TLS), assim como o seu antecessor Secure Sockets Layer (SSL), \u00E9 um protocolo de seguran\u00E7a projetado para fornecer sobre uma rede de computadores. V\u00E1rias vers\u00F5es do protocolo encontram amplo uso em aplicativos como , email, mensagens instant\u00E2neas e voz sobre IP (VoIP). Os sites podem usar o TLS para proteger todas as comunica\u00E7\u00F5es entre seus servidores e navegadores web. O protocolo TLS compreende duas camadas: o registro TLS e os protocolos de handshake TLS."@pt . . . . . "187813"^^ . . . . . . . . . "Transport Layer Security"@en . "Seguridad de la capa de transporte"@es . . . . . . . . . . . . . "Transport Layer Security"@fr . . . . . . "Transport Layer Security"@de . . "\uC804\uC1A1 \uACC4\uCE35 \uBCF4\uC548(\uC601\uC5B4: Transport Layer Security, TLS, \uACFC\uAC70 \uBA85\uCE6D: \uBCF4\uC548 \uC18C\uCF13 \uB808\uC774\uC5B4/Secure Sockets Layer, SSL)\uB294 \uCEF4\uD4E8\uD130 \uB124\uD2B8\uC6CC\uD06C\uC5D0 \uC744 \uC81C\uACF5\uD558\uAE30 \uC704\uD574 \uC124\uACC4\uB41C \uC554\uD638 \uADDC\uC57D\uC774\uB2E4. \uADF8\uB9AC\uACE0 '\uD2B8\uB79C\uC2A4\uD3EC\uD2B8 \uB808\uC774\uC5B4 \uBCF4\uC548'\uC774\uB77C\uB294 \uC774\uB984\uC740 '\uBCF4\uC548 \uC18C\uCF13 \uB808\uC774\uC5B4'\uAC00 \uD45C\uC900\uD654 \uB418\uBA74\uC11C \uBC14\uB010 \uC774\uB984\uC774\uB2E4. \uC774 \uADDC\uC57D\uC740 \uC778\uD130\uB137 \uAC19\uC774 TCP/IP \uB124\uD2B8\uC6CC\uD06C\uB97C \uC0AC\uC6A9\uD558\uB294 \uD1B5\uC2E0\uC5D0 \uC801\uC6A9\uB418\uBA70, \uD1B5\uC2E0 \uACFC\uC815\uC5D0\uC11C \uC804\uC1A1\uACC4\uCE35 \uC885\uB2E8\uAC04 \uBCF4\uC548\uACFC \uB370\uC774\uD130 \uBB34\uACB0\uC131\uC744 \uD655\uBCF4\uD574\uC900\uB2E4. \uC774 \uADDC\uC57D\uC740 , \uC804\uC790 \uBA54\uC77C, \uC778\uC2A4\uD134\uD2B8 \uBA54\uC2E0\uC800, voice-over-IP (VoIP) \uAC19\uC740 \uC751\uC6A9 \uBD80\uBD84\uC5D0 \uC801\uC6A9\uB418\uACE0 \uC788\uB2E4. \uAD6D\uC81C \uC778\uD130\uB137 \uD45C\uC900\uD654 \uAE30\uAD6C(IETF)\uC5D0 \uC758\uD574 \uD604\uC7AC \uAD6C\uC2DD(deprecate)\uC73C\uB85C \uAC04\uC8FC\uB418\uC5B4 \uC788\uB2E4. \uCD5C\uC885 \uAC31\uC2E0\uC740 RFC 5246\uC774\uACE0, \uCD5C\uC885 \uAC31\uC2E0 \uBC84\uC804\uC740 \uB137\uC2A4\uCF00\uC774\uD504\uC5D0\uC11C \uB9CC\uB4E0 SSL \uD45C\uC900\uC744 \uBC14\uD0D5\uC73C\uB85C \uD588\uB2E4."@ko . . . . . . "Transport Layer Security (TLS), \u2019transportlagers\u00E4kerhet\u2019, \u00E4r ett kryptografiskt kommunikationsprotokoll som \u00E4r en \u00F6ppen standard f\u00F6r s\u00E4kert utbyte av krypterad information mellan datorsystem. TLS \u00E4r en vidareutveckling av version 3 av SSL-protokollet, och st\u00E5r under IETF:s kontroll. Den f\u00F6rsta versionen av TLS, The TLS Protocol Version 1.0, publicerades den 27 januari 1999. TLS kan anv\u00E4ndas med flera olika protokoll, s\u00E5som \u201DHTTPS\u201D (egentligen protokollet HTTP med till\u00E4gget \u201DS\u201D (secure) som indikerar att det anv\u00E4nds \u00F6ver TLS (eller SSL)), FTPS, IMAP, POP3 och SMTP. En unders\u00F6kning av de 138 155 mest bes\u00F6kta webbplatserna, som erbjuder anslutning \u00F6ver TLS, visar att 51,5 % st\u00F6der TLS 1.0, 58,5 % st\u00F6der TLS 1.1, 99,0 % st\u00F6der TLS 1.2 och 39,8 % st\u00F6der TLS 1.3 i b\u00F6rjan av oktober 2020. 90\u201393 % av anslutningarna till Wikimedias sidor, som sedan 4 maj 2016 st\u00F6der HTTP/2, anv\u00E4nder TLS 1.2, medan 7\u20139 % anv\u00E4nder TLS 1.0, och knappt 1 % anv\u00E4nder TLS 1.1, i b\u00F6rjan av juni 2016. HTTP/2-implementeringar m\u00E5ste anv\u00E4nda TLS 1.2 eller h\u00F6gre. Den 10 augusti 2018 meddelades att RFC 8446 (TLS 1.3) hade publicerats. Ett f\u00F6rsta TLS 1.3-utkast publicerades i april 2014, och den 20 mars 2018 publicerades utkast 28, som godk\u00E4ndes den 21 mars. TLS 1.3 anv\u00E4nds ocks\u00E5 i transportprotokollet ."@sv . . . "Transport Layer Security (TLS, englisch f\u00FCr Transportschichtsicherheit), auch bekannt unter der Vorg\u00E4ngerbezeichnung Secure Sockets Layer (SSL), ist ein Verschl\u00FCsselungsprotokoll zur sicheren Daten\u00FCbertragung im Internet. TLS besteht aus den beiden Hauptkomponenten TLS Handshake und TLS Record. Im TLS Handshake findet ein sicherer Schl\u00FCsselaustausch und eine Authentifizierung statt. TLS Record verwendet dann den im TLS Handshake ausgehandelten symmetrischen Schl\u00FCssel f\u00FCr eine sichere Daten\u00FCbertragung \u2013 die Daten werden verschl\u00FCsselt und mit einem MAC gegen Ver\u00E4nderungen gesch\u00FCtzt \u00FCbertragen."@de . "Protokol Transport Layer Security (TLS) a jeho p\u0159edch\u016Fdce Secure Sockets Layer (SSL) jsou kryptografick\u00E9 protokoly poskytuj\u00EDc\u00ED mo\u017Enost komunikace na Internetu pro slu\u017Eby jako WWW, elektronick\u00E1 po\u0161ta, a dal\u0161\u00ED datov\u00E9 p\u0159enosy. Mezi protokoly SSL 3.0 a TLS 1.0 jsou drobn\u00E9 rozd\u00EDly, ale v z\u00E1sad\u011B jsou stejn\u00E9. Zde pou\u017Eit\u00FD term\u00EDn \u201ETLS\u201C se t\u00FDk\u00E1 obou dvou, pokud nen\u00ED z kontextu z\u0159ejm\u00FD opak."@cs . . "\uC804\uC1A1 \uACC4\uCE35 \uBCF4\uC548(\uC601\uC5B4: Transport Layer Security, TLS, \uACFC\uAC70 \uBA85\uCE6D: \uBCF4\uC548 \uC18C\uCF13 \uB808\uC774\uC5B4/Secure Sockets Layer, SSL)\uB294 \uCEF4\uD4E8\uD130 \uB124\uD2B8\uC6CC\uD06C\uC5D0 \uC744 \uC81C\uACF5\uD558\uAE30 \uC704\uD574 \uC124\uACC4\uB41C \uC554\uD638 \uADDC\uC57D\uC774\uB2E4. \uADF8\uB9AC\uACE0 '\uD2B8\uB79C\uC2A4\uD3EC\uD2B8 \uB808\uC774\uC5B4 \uBCF4\uC548'\uC774\uB77C\uB294 \uC774\uB984\uC740 '\uBCF4\uC548 \uC18C\uCF13 \uB808\uC774\uC5B4'\uAC00 \uD45C\uC900\uD654 \uB418\uBA74\uC11C \uBC14\uB010 \uC774\uB984\uC774\uB2E4. \uC774 \uADDC\uC57D\uC740 \uC778\uD130\uB137 \uAC19\uC774 TCP/IP \uB124\uD2B8\uC6CC\uD06C\uB97C \uC0AC\uC6A9\uD558\uB294 \uD1B5\uC2E0\uC5D0 \uC801\uC6A9\uB418\uBA70, \uD1B5\uC2E0 \uACFC\uC815\uC5D0\uC11C \uC804\uC1A1\uACC4\uCE35 \uC885\uB2E8\uAC04 \uBCF4\uC548\uACFC \uB370\uC774\uD130 \uBB34\uACB0\uC131\uC744 \uD655\uBCF4\uD574\uC900\uB2E4. \uC774 \uADDC\uC57D\uC740 , \uC804\uC790 \uBA54\uC77C, \uC778\uC2A4\uD134\uD2B8 \uBA54\uC2E0\uC800, voice-over-IP (VoIP) \uAC19\uC740 \uC751\uC6A9 \uBD80\uBD84\uC5D0 \uC801\uC6A9\uB418\uACE0 \uC788\uB2E4. \uAD6D\uC81C \uC778\uD130\uB137 \uD45C\uC900\uD654 \uAE30\uAD6C(IETF)\uC5D0 \uC758\uD574 \uD604\uC7AC \uAD6C\uC2DD(deprecate)\uC73C\uB85C \uAC04\uC8FC\uB418\uC5B4 \uC788\uB2E4. \uCD5C\uC885 \uAC31\uC2E0\uC740 RFC 5246\uC774\uACE0, \uCD5C\uC885 \uAC31\uC2E0 \uBC84\uC804\uC740 \uB137\uC2A4\uCF00\uC774\uD504\uC5D0\uC11C \uB9CC\uB4E0 SSL \uD45C\uC900\uC744 \uBC14\uD0D5\uC73C\uB85C \uD588\uB2E4."@ko . . . . . "Transport Layer Security (TLS) en diens voorganger Secure Sockets Layer (SSL), zijn encryptie-protocollen die de communicatie tussen computers (bijvoorbeeld op het internet) beveiligen."@nl . . . "La Transport Layer Security ( TLS ; en catal\u00E0 \u00ABseguretat de la capa de transport\u00BB ) i la seva antecessora Secure Sockets Layer ( SSL ; en catal\u00E0 \u00ABcapa de s\u00F2col segur\u00BB), s\u00F3n protocols criptogr\u00E0fics que proporcionen comunicacions segures per una xarxa, generalment Internet. SSL est\u00E0 ja obsoletitzat per la IETF perqu\u00E8 es considera insegur, cal usar sempre TLS."@ca . . . . . . . . . . . . . . . . . "Transport Layer Security"@in . . . . . . . . . . . . . . . . . . . . . . . . . . "\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0637\u0628\u0642\u0629 \u0627\u0644\u0645\u0642\u0627\u0628\u0633 \u0627\u0644\u0622\u0645\u0646\u0629"@ar . "1124949262"^^ . "TLS"@el . . . . . . . . . . . "La Transport Layer Security ( TLS ; en catal\u00E0 \u00ABseguretat de la capa de transport\u00BB ) i la seva antecessora Secure Sockets Layer ( SSL ; en catal\u00E0 \u00ABcapa de s\u00F2col segur\u00BB), s\u00F3n protocols criptogr\u00E0fics que proporcionen comunicacions segures per una xarxa, generalment Internet. SSL est\u00E0 ja obsoletitzat per la IETF perqu\u00E8 es considera insegur, cal usar sempre TLS."@ca . . . "SSL (Secure Sockets Layer) eta TLS (Transport Layer Security), Garraio Geruzako Segurtasuna, SSL-ren ondorengoa, Internet-en komunikazio seguruak ezartzeko dira."@eu . . . . . . . . . "La Transport Layer Security (TLS) ou \u00AB S\u00E9curit\u00E9 de la couche de transport \u00BB, et son pr\u00E9d\u00E9cesseur la Secure Sockets Layer (SSL) ou \u00AB Couche de sockets s\u00E9curis\u00E9e \u00BB, sont des protocoles de s\u00E9curisation des \u00E9changes par r\u00E9seau informatique, notamment par Internet. Le protocole SSL a \u00E9t\u00E9 d\u00E9velopp\u00E9 \u00E0 l'origine par Netscape Communications Corporation pour son navigateur Web. L'organisme de normalisation Internet Engineering Task Force (IETF) en a poursuivi le d\u00E9veloppement en le rebaptisant Transport Layer Security (TLS). On parle parfois de SSL/TLS pour d\u00E9signer indiff\u00E9remment SSL ou TLS."@fr . . . . . . . "Transport Layer Security"@nl . . . . . . . . . . . . . . . "Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The closely related Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications. In technical writing you often you will see references to (D)TLS when it applies to both versions."@en . . "Transport Layer Security"@ca . . . . . . . . . . . . . . "\u03A4\u03BF Transport Layer Security (TLS) \u03BA\u03B1\u03B9 \u03BF \u03C0\u03C1\u03BF\u03BA\u03AC\u03C4\u03BF\u03C7\u03CC\u03C2 \u03C4\u03BF\u03C5, \u03C4\u03BF Secure Sockets Layer (SSL), \u03C4\u03B1 \u03BF\u03C0\u03BF\u03AF\u03B1 \u03C3\u03C5\u03C7\u03BD\u03AC \u03B1\u03BD\u03B1\u03C6\u03AD\u03C1\u03BF\u03BD\u03C4\u03B1\u03B9 \u03C9\u03C2 \u03B1\u03C0\u03BB\u03AC \"SSL\", \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C4\u03B1 \u03BF\u03C0\u03BF\u03AF\u03B1 \u03C0\u03B1\u03C1\u03AD\u03C7\u03BF\u03C5\u03BD \u03C0\u03AC\u03BD\u03C9 \u03B1\u03C0\u03CC \u03AD\u03BD\u03B1 . \u0391\u03C1\u03BA\u03B5\u03C4\u03AD\u03C2 \u03B1\u03C0\u03CC \u03C4\u03B9\u03C2 \u03B5\u03BA\u03B4\u03CC\u03C3\u03B5\u03B9\u03C2 \u03C4\u03BF\u03C5 \u03C0\u03C1\u03C9\u03C4\u03BF\u03BA\u03CC\u03BB\u03BB\u03BF\u03C5 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03BF\u03CD\u03BD\u03C4\u03B1\u03B9 \u03C3\u03B5 \u03B5\u03C6\u03B1\u03C1\u03BC\u03BF\u03B3\u03AD\u03C2 \u03CC\u03C0\u03C9\u03C2 \u03B7 \u03C0\u03B5\u03C1\u03B9\u03AE\u03B3\u03B7\u03C3\u03B7 \u03C3\u03C4\u03BF\u03BD \u03B9\u03C3\u03C4\u03CC, \u03C4\u03BF \u0397\u03BB\u03B5\u03BA\u03C4\u03C1\u03BF\u03BD\u03B9\u03BA\u03CC \u03C4\u03B1\u03C7\u03C5\u03B4\u03C1\u03BF\u03BC\u03B5\u03AF\u03BF, \u03B7 \u03B1\u03C0\u03BF\u03C3\u03C4\u03BF\u03BB\u03AE \u03C4\u03B7\u03BB\u03B5\u03BF\u03BC\u03BF\u03B9\u03CC\u03C4\u03C5\u03C0\u03C9\u03BD, \u03C4\u03B1 \u0386\u03BC\u03B5\u03C3\u03B1 \u039C\u03B7\u03BD\u03CD\u03BC\u03B1\u03C4\u03B1, \u03BA\u03B1\u03B8\u03CE\u03C2 \u03BA\u03B1\u03B9 \u03BF\u03B9 \u03BA\u03BB\u03AE\u03C3\u03B5\u03B9\u03C2 \u03BC\u03AD\u03C3\u03C9 IP (VoIP). \u039F\u03B9 \u03B9\u03C3\u03C4\u03BF\u03C3\u03B5\u03BB\u03AF\u03B4\u03B5\u03C2 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03BF\u03CD\u03BD TLS \u03B3\u03B9\u03B1 \u03BD\u03B1 \u03B4\u03B9\u03B1\u03C3\u03C6\u03B1\u03BB\u03AF\u03C3\u03BF\u03C5\u03BD \u03CC\u03BB\u03B7 \u03C4\u03B7\u03BD \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03AF\u03B1 \u03BC\u03B5\u03C4\u03B1\u03BE\u03CD \u03C4\u03C9\u03BD \u03B5\u03BE\u03C5\u03C0\u03B7\u03C1\u03B5\u03C4\u03B7\u03C4\u03CE\u03BD \u03C4\u03BF\u03C5\u03C2 \u03BA\u03B1\u03B9 \u03C4\u03C9\u03BD \u03C0\u03B5\u03C1\u03B9\u03B7\u03B3\u03B7\u03C4\u03CE\u03BD \u03B9\u03C3\u03C4\u03BF\u03CD. \u03A4\u03BF \u03C0\u03C1\u03C9\u03C4\u03CC\u03BA\u03BF\u03BB\u03BB\u03BF TLS \u03B1\u03C0\u03BF\u03C4\u03B5\u03BB\u03B5\u03AF\u03C4\u03B1\u03B9 \u03B1\u03C0\u03CC \u03B4\u03CD\u03BF \u03B5\u03C0\u03AF\u03C0\u03B5\u03B4\u03B1, \u03C4\u03BF , \u03BA\u03B1\u03B9 \u03C4\u03BF ."@el . . . . . . . . . . . . . . "Transport Layer Security (TLS), dan pendahulunya yang sudah usang, Secure Sockets Layer (SSL), adalah protokol kriptografi yang dirancang untuk memberikan keamanan komunikasi melalui jaringan komputer. Beberapa versi protokol TLS dapat ditemukan penerapannya secara luas seperti di peramban web, surel, pesan instan, dan voice over IP (VoIP). Situs web dapat menggunakan TLS untuk mengamankan semua komunikasi antara peladen dan peramban web."@in . . . "\u03A4\u03BF Transport Layer Security (TLS) \u03BA\u03B1\u03B9 \u03BF \u03C0\u03C1\u03BF\u03BA\u03AC\u03C4\u03BF\u03C7\u03CC\u03C2 \u03C4\u03BF\u03C5, \u03C4\u03BF Secure Sockets Layer (SSL), \u03C4\u03B1 \u03BF\u03C0\u03BF\u03AF\u03B1 \u03C3\u03C5\u03C7\u03BD\u03AC \u03B1\u03BD\u03B1\u03C6\u03AD\u03C1\u03BF\u03BD\u03C4\u03B1\u03B9 \u03C9\u03C2 \u03B1\u03C0\u03BB\u03AC \"SSL\", \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C4\u03B1 \u03BF\u03C0\u03BF\u03AF\u03B1 \u03C0\u03B1\u03C1\u03AD\u03C7\u03BF\u03C5\u03BD \u03C0\u03AC\u03BD\u03C9 \u03B1\u03C0\u03CC \u03AD\u03BD\u03B1 . \u0391\u03C1\u03BA\u03B5\u03C4\u03AD\u03C2 \u03B1\u03C0\u03CC \u03C4\u03B9\u03C2 \u03B5\u03BA\u03B4\u03CC\u03C3\u03B5\u03B9\u03C2 \u03C4\u03BF\u03C5 \u03C0\u03C1\u03C9\u03C4\u03BF\u03BA\u03CC\u03BB\u03BB\u03BF\u03C5 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03BF\u03CD\u03BD\u03C4\u03B1\u03B9 \u03C3\u03B5 \u03B5\u03C6\u03B1\u03C1\u03BC\u03BF\u03B3\u03AD\u03C2 \u03CC\u03C0\u03C9\u03C2 \u03B7 \u03C0\u03B5\u03C1\u03B9\u03AE\u03B3\u03B7\u03C3\u03B7 \u03C3\u03C4\u03BF\u03BD \u03B9\u03C3\u03C4\u03CC, \u03C4\u03BF \u0397\u03BB\u03B5\u03BA\u03C4\u03C1\u03BF\u03BD\u03B9\u03BA\u03CC \u03C4\u03B1\u03C7\u03C5\u03B4\u03C1\u03BF\u03BC\u03B5\u03AF\u03BF, \u03B7 \u03B1\u03C0\u03BF\u03C3\u03C4\u03BF\u03BB\u03AE \u03C4\u03B7\u03BB\u03B5\u03BF\u03BC\u03BF\u03B9\u03CC\u03C4\u03C5\u03C0\u03C9\u03BD, \u03C4\u03B1 \u0386\u03BC\u03B5\u03C3\u03B1 \u039C\u03B7\u03BD\u03CD\u03BC\u03B1\u03C4\u03B1, \u03BA\u03B1\u03B8\u03CE\u03C2 \u03BA\u03B1\u03B9 \u03BF\u03B9 \u03BA\u03BB\u03AE\u03C3\u03B5\u03B9\u03C2 \u03BC\u03AD\u03C3\u03C9 IP (VoIP). \u039F\u03B9 \u03B9\u03C3\u03C4\u03BF\u03C3\u03B5\u03BB\u03AF\u03B4\u03B5\u03C2 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03BF\u03CD\u03BD TLS \u03B3\u03B9\u03B1 \u03BD\u03B1 \u03B4\u03B9\u03B1\u03C3\u03C6\u03B1\u03BB\u03AF\u03C3\u03BF\u03C5\u03BD \u03CC\u03BB\u03B7 \u03C4\u03B7\u03BD \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03AF\u03B1 \u03BC\u03B5\u03C4\u03B1\u03BE\u03CD \u03C4\u03C9\u03BD \u03B5\u03BE\u03C5\u03C0\u03B7\u03C1\u03B5\u03C4\u03B7\u03C4\u03CE\u03BD \u03C4\u03BF\u03C5\u03C2 \u03BA\u03B1\u03B9 \u03C4\u03C9\u03BD \u03C0\u03B5\u03C1\u03B9\u03B7\u03B3\u03B7\u03C4\u03CE\u03BD \u03B9\u03C3\u03C4\u03BF\u03CD. \u03A4\u03BF \u03C0\u03C1\u03C9\u03C4\u03CC\u03BA\u03BF\u03BB\u03BB\u03BF Transport Layer Security \u03C3\u03C4\u03BF\u03C7\u03B5\u03CD\u03B5\u03B9 \u03C3\u03C4\u03BF \u03BD\u03B1 \u03C0\u03C1\u03BF\u03C3\u03C6\u03AD\u03C1\u03B5\u03B9 \u03B9\u03B4\u03B9\u03C9\u03C4\u03B9\u03BA\u03CC\u03C4\u03B7\u03C4\u03B1 \u03BA\u03B1\u03B9 \u03BC\u03B5\u03C4\u03B1\u03BE\u03CD \u03B4\u03CD\u03BF \u03B5\u03C6\u03B1\u03C1\u03BC\u03BF\u03B3\u03CE\u03BD \u03B7\u03BB\u03B5\u03BA\u03C4\u03C1\u03BF\u03BD\u03B9\u03BA\u03CE\u03BD \u03C5\u03C0\u03BF\u03BB\u03BF\u03B3\u03B9\u03C3\u03C4\u03CE\u03BD \u03C0\u03BF\u03C5 \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03BF\u03CD\u03BD \u03BC\u03B5\u03C4\u03B1\u03BE\u03CD \u03C4\u03BF\u03C5\u03C2. \u038C\u03C4\u03B1\u03BD \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03B5\u03AF\u03C4\u03B1\u03B9 \u03C3\u03B5 \u03BC\u03AF\u03B1 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7 \u03B1\u03BD\u03AC\u03BC\u03B5\u03C3\u03B1 \u03C3\u03B5 \u03AD\u03BD\u03B1\u03BD \u03C0\u03B5\u03BB\u03AC\u03C4\u03B7 (\u03C0.\u03C7. \u03AD\u03BD\u03B1\u03BD \u03C0\u03B5\u03C1\u03B9\u03B7\u03B3\u03B7\u03C4\u03AE \u03B9\u03C3\u03C4\u03BF\u03CD) \u03BA\u03B1\u03B9 \u03AD\u03BD\u03B1\u03BD \u03B5\u03BE\u03C5\u03C0\u03B7\u03C1\u03B5\u03C4\u03B7\u03C4\u03AE (\u03C0.\u03C7. \u03C4\u03BF wikipedia.org), \u03B7 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7 \u03B1\u03C5\u03C4\u03AE \u03AD\u03C7\u03B5\u03B9 \u03BC\u03AF\u03B1 \u03AE \u03C0\u03B5\u03C1\u03B9\u03C3\u03C3\u03CC\u03C4\u03B5\u03C1\u03B5\u03C2 \u03B9\u03B4\u03B9\u03CC\u03C4\u03B7\u03C4\u03B5\u03C2: \n* \u0397 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7 \u03B1\u03C5\u03C4\u03AE \u03B5\u03AF\u03BD\u03B1\u03B9 \u00AB\u03B9\u03B4\u03B9\u03C9\u03C4\u03B9\u03BA\u03AE\u00BB (\u03AE \u00AB\u03B1\u03C3\u03C6\u03B1\u03BB\u03AE\u03C2\u00BB) \u03BA\u03B1\u03B9 \u03B1\u03C0\u03BF\u03BB\u03CD\u03C4\u03C9\u03C2 \u03C3\u03C5\u03BC\u03B2\u03B1\u03C4\u03AE \u03BC\u03B5 \u03C4\u03B9\u03C2 \u03BC\u03B7\u03C7\u03B1\u03BD\u03AD\u03C2 \u03B1\u03BD\u03B1\u03B6\u03AE\u03C4\u03B7\u03C3\u03B7\u03C2, \u03C7\u03AC\u03C1\u03B7 \u03C3\u03C4\u03B7\u03BD , \u03B7 \u03BF\u03C0\u03BF\u03AF\u03B1 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03B5\u03AF\u03C4\u03B1\u03B9 \u03B3\u03B9\u03B1 \u03C4\u03B7\u03BD \u03BA\u03C1\u03C5\u03C0\u03C4\u03BF\u03B3\u03C1\u03AC\u03C6\u03B7\u03C3\u03B7 \u03C4\u03C9\u03BD \u03B4\u03B5\u03B4\u03BF\u03BC\u03AD\u03BD\u03C9\u03BD \u03C0\u03BF\u03C5 \u03B1\u03C0\u03BF\u03C3\u03C4\u03AD\u03BB\u03BB\u03BF\u03BD\u03C4\u03B1\u03B9. \u03A4\u03B1 \u03B3\u03B9\u03B1 \u03B1\u03C5\u03C4\u03AE\u03BD \u03C4\u03B7\u03BD \u03C3\u03C5\u03BC\u03BC\u03B5\u03C4\u03C1\u03B9\u03BA\u03AE \u03BA\u03C1\u03C5\u03C0\u03C4\u03BF\u03B3\u03C1\u03AC\u03C6\u03B7\u03C3\u03B7 \u03B4\u03B7\u03BC\u03B9\u03BF\u03C5\u03C1\u03B3\u03BF\u03CD\u03BD\u03C4\u03B1\u03B9 \u03B2\u03AC\u03C3\u03B7 \u03B5\u03BD\u03CC\u03C2 \u03BA\u03BF\u03B9\u03BD\u03BF\u03CD \u03BC\u03C5\u03C3\u03C4\u03B9\u03BA\u03BF\u03CD \u03C4\u03BF \u03BF\u03C0\u03BF\u03AF\u03BF \u03C3\u03C5\u03BC\u03C6\u03C9\u03BD\u03B5\u03AF\u03C4\u03B1\u03B9 \u03C3\u03C4\u03B7\u03BD \u03B1\u03C1\u03C7\u03AE \u03C4\u03B7\u03C2 \u03C3\u03C5\u03BD\u03B5\u03B4\u03C1\u03AF\u03B1\u03C2 (\u03B2\u03BB. ) \u03BA\u03B1\u03B9 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03BC\u03BF\u03BD\u03B1\u03B4\u03B9\u03BA\u03AC \u03B3\u03B9\u03B1 \u03BA\u03AC\u03B8\u03B5 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7. \u039F \u03C0\u03B5\u03BB\u03AC\u03C4\u03B7\u03C2 \u03BA\u03B1\u03B9 \u03BF \u03B5\u03BE\u03C5\u03C0\u03B7\u03C1\u03B5\u03C4\u03B7\u03C4\u03AE\u03C2 \u03C3\u03C5\u03BC\u03C6\u03C9\u03BD\u03BF\u03CD\u03BD \u03C3\u03C4\u03B9\u03C2 \u03BB\u03B5\u03C0\u03C4\u03BF\u03BC\u03AD\u03C1\u03B5\u03B9\u03B5\u03C2 \u03B3\u03B9\u03B1 \u03C4\u03BF\u03BD \u03BA\u03B1\u03B9 \u03C4\u03BF \u03C0\u03C1\u03B9\u03BD \u03BC\u03B5\u03C4\u03B1\u03B4\u03BF\u03B8\u03B5\u03AF \u03C4\u03BF \u03C0\u03C1\u03CE\u03C4\u03BF byte \u03C0\u03BB\u03B7\u03C1\u03BF\u03C6\u03BF\u03C1\u03AF\u03B1\u03C2 (\u03B2\u03BB. \u03C0\u03B1\u03C1\u03B1\u03BA\u03AC\u03C4\u03C9). \u0397 \u03C3\u03C5\u03BC\u03C6\u03C9\u03BD\u03AF\u03B1 \u03B1\u03C5\u03C4\u03AE \u03B3\u03B9\u03B1 \u03C4\u03BF \u03BA\u03BF\u03B9\u03BD\u03CC \u03BC\u03C5\u03C3\u03C4\u03B9\u03BA\u03CC \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B1\u03C3\u03C6\u03B1\u03BB\u03AE\u03C2 (\u03C4\u03BF \u03BC\u03C5\u03C3\u03C4\u03B9\u03BA\u03CC \u03B1\u03C5\u03C4\u03CC \u03B4\u03B5\u03BD \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B4\u03B9\u03B1\u03B8\u03AD\u03C3\u03B9\u03BC\u03BF \u03C3\u03B5 \u03AC\u03C4\u03BF\u03BC\u03B1 \u03C0\u03BF\u03C5 \u03C0\u03B1\u03C1\u03B1\u03BA\u03BF\u03BB\u03BF\u03C5\u03B8\u03BF\u03CD\u03BD \u03C4\u03B7\u03BD \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7 \u03BA\u03B1\u03B9 \u03B4\u03B5\u03BD \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03B2\u03C1\u03B5\u03B8\u03B5\u03AF, \u03B1\u03BA\u03CC\u03BC\u03B1 \u03BA\u03B1\u03B9 \u03B1\u03BD \u03BF \u03B5\u03C0\u03B9\u03C4\u03B9\u03B8\u03AD\u03BC\u03B5\u03BD\u03BF\u03C2 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C3\u03C4\u03BF \u03BC\u03AD\u03C3\u03BF \u03C4\u03B7\u03C2 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7\u03C2) \u03BA\u03B1\u03B9 \u03B1\u03BE\u03B9\u03CC\u03C0\u03B9\u03C3\u03C4\u03B7 (\u03BA\u03B1\u03BD\u03AD\u03BD\u03B1\u03C2 \u03B5\u03C0\u03B9\u03C4\u03B9\u03B8\u03AD\u03BC\u03B5\u03BD\u03BF\u03C2 \u03B4\u03B5\u03BD \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03C4\u03C1\u03BF\u03C0\u03BF\u03C0\u03BF\u03B9\u03AE\u03C3\u03B5\u03B9 \u03C4\u03B1 \u03B4\u03B5\u03B4\u03BF\u03BC\u03AD\u03BD\u03B1 \u03C4\u03B7\u03C2 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7\u03C2 \u03BA\u03B1\u03C4\u03AC \u03C4\u03B7\u03BD \u03B4\u03B9\u03AC\u03C1\u03BA\u03B5\u03B9\u03B1 \u03C4\u03B7\u03C2 \u03C7\u03B5\u03B9\u03C1\u03B1\u03C8\u03AF\u03B1\u03C2 \u03C7\u03C9\u03C1\u03AF\u03C2 \u03BD\u03B1 \u03B3\u03AF\u03BD\u03B5\u03B9 \u03B1\u03BD\u03C4\u03B9\u03BB\u03B7\u03C0\u03C4\u03CC\u03C2). \n* \u0397 \u03C4\u03B1\u03C5\u03C4\u03CC\u03C4\u03B7\u03C4\u03B1 \u03C4\u03C9\u03BD \u03B4\u03CD\u03BF \u03BC\u03B5\u03BB\u03CE\u03BD \u03C4\u03B7\u03C2 \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03AF\u03B1\u03C2 \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03B1\u03C5\u03B8\u03B5\u03BD\u03C4\u03B9\u03BA\u03BF\u03C0\u03BF\u03B9\u03B7\u03B8\u03B5\u03AF \u03BC\u03AD\u03C3\u03C9 \u03BA\u03C1\u03C5\u03C0\u03C4\u03BF\u03B3\u03C1\u03B1\u03C6\u03AF\u03B1\u03C2 \u03B4\u03B7\u03BC\u03BF\u03C3\u03AF\u03BF\u03C5 \u03BA\u03BB\u03B5\u03B9\u03B4\u03B9\u03BF\u03CD. \u0397 \u03B1\u03C5\u03B8\u03B5\u03BD\u03C4\u03B9\u03BA\u03BF\u03C0\u03BF\u03AF\u03B7\u03C3\u03B7 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C0\u03C1\u03BF\u03B1\u03B9\u03C1\u03B5\u03C4\u03B9\u03BA\u03AE, \u03B1\u03BB\u03BB\u03AC \u03B3\u03B5\u03BD\u03B9\u03BA\u03AC \u03C7\u03C1\u03B5\u03B9\u03AC\u03B6\u03B5\u03C4\u03B1\u03B9 \u03B3\u03B9\u03B1 \u03C4\u03BF\u03C5\u03BB\u03AC\u03C7\u03B9\u03C3\u03C4\u03BF\u03BD \u03AD\u03BD\u03B1 \u03B1\u03C0\u03CC \u03C4\u03B1 \u03B4\u03CD\u03BF \u03AC\u03BA\u03C1\u03B1 \u03C4\u03B7\u03C2 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7\u03C2. \u0395\u03AF\u03BD\u03B1\u03B9 \u03B7 \u03B2\u03B1\u03C3\u03B9\u03BA\u03AE \u03C0\u03C1\u03BF\u03CB\u03C0\u03CC\u03B8\u03B5\u03C3\u03B7 \u03C0\u03BF\u03C5 \u03C0\u03C1\u03AD\u03C0\u03B5\u03B9 \u03BD\u03B1 \u03B4\u03B9\u03B1\u03B8\u03AD\u03C4\u03B5\u03B9 \u03BA\u03AC\u03B8\u03B5 \u03B9\u03C3\u03C4\u03CC\u03C4\u03BF\u03C0\u03BF\u03C2 \u03C0\u03C1\u03C9\u03C4\u03BF\u03BA\u03CC\u03BB\u03BB\u03BF\u03C5 \u03B3\u03B9\u03B1 \u03BD\u03B1 \u03BC\u03B7\u03BD \u03B5\u03BC\u03C6\u03B1\u03BD\u03B9\u03C3\u03C4\u03BF\u03CD\u03BD \u03C0\u03C1\u03BF\u03B2\u03BB\u03AE\u03BC\u03B1\u03C4\u03B1 \u03C3\u03C4\u03B9\u03C2 \u03C3\u03C5\u03BD\u03B4\u03AD\u03C3\u03B5\u03B9\u03C2 \u03BC\u03B5 \u03C4\u03BF\u03BD \u03B5\u03BE\u03C5\u03C0\u03B7\u03C1\u03B5\u03C4\u03B7\u03C4\u03AE \u03BA\u03B1\u03B9 \u03BC\u03B5 \u03C4\u03B7\u03BD google \u03C0\u03BF\u03C5 \u03BC\u03B5\u03C3\u03BF\u03BB\u03B1\u03B2\u03B5\u03AF \u03C3\u03C4\u03B7\u03BD \u03B4\u03B9\u03B1\u03B4\u03B9\u03BA\u03B1\u03C3\u03AF\u03B1 \u03B1\u03C5\u03C4\u03AE. \n* \u0397 \u03C3\u03CD\u03BD\u03B4\u03B5\u03C3\u03B7 \u03B5\u03B3\u03B3\u03C5\u03AC\u03C4\u03B1\u03B9 \u00AB\u03B1\u03BA\u03B5\u03C1\u03B1\u03B9\u03CC\u03C4\u03B7\u03C4\u03B1 \u03B4\u03B5\u03B4\u03BF\u03BC\u03AD\u03BD\u03C9\u03BD\u00BB \u03B3\u03B9\u03B1\u03C4\u03AF \u03BA\u03AC\u03B8\u03B5 \u03BC\u03AE\u03BD\u03C5\u03BC\u03B1 \u03C0\u03BF\u03C5 \u03B1\u03C0\u03BF\u03C3\u03C4\u03AD\u03BB\u03BB\u03B5\u03C4\u03B1\u03B9 \u03C0\u03B5\u03C1\u03B9\u03BB\u03B1\u03BC\u03B2\u03AC\u03BD\u03B5\u03B9 \u03AD\u03BD\u03B1 \u03BC\u03AE\u03BD\u03C5\u03BC\u03B1 \u03B5\u03BB\u03AD\u03B3\u03C7\u03BF\u03C5 \u03B1\u03BA\u03B5\u03C1\u03B1\u03B9\u03CC\u03C4\u03B7\u03C4\u03B1\u03C2 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03CE\u03BD\u03C4\u03B1\u03C2 \u03AD\u03BD\u03B1\u03BD \u03BA\u03C9\u03B4\u03B9\u03BA\u03CC \u03B1\u03C5\u03B8\u03B5\u03BD\u03C4\u03B9\u03BA\u03BF\u03C0\u03BF\u03AF\u03B7\u03C3\u03B7\u03C2 \u03BC\u03B7\u03BD\u03CD\u03BC\u03B1\u03C4\u03BF\u03C2 \u03B3\u03B9\u03B1 \u03BD\u03B1 \u03B1\u03BD\u03B9\u03C7\u03BD\u03B5\u03CD\u03C3\u03B5\u03B9 \u03B1\u03C0\u03CE\u03BB\u03B5\u03B9\u03B1 \u03AE \u03C4\u03C1\u03BF\u03C0\u03BF\u03C0\u03BF\u03AF\u03B7\u03C3\u03B7 \u03C4\u03C9\u03BD \u03B4\u03B5\u03B4\u03BF\u03BC\u03AD\u03BD\u03C9\u03BD \u03BA\u03B1\u03C4\u03AC \u03C4\u03B7\u03BD \u03B4\u03B9\u03AC\u03C1\u03BA\u03B5\u03B9\u03B1 \u03C4\u03B7\u03C2 \u03B1\u03C0\u03BF\u03C3\u03C4\u03BF\u03BB\u03AE\u03C2. \u0395\u03C0\u03B9\u03C0\u03BB\u03AD\u03BF\u03BD \u03C4\u03C9\u03BD \u03C0\u03B1\u03C1\u03B1\u03C0\u03AC\u03BD\u03C9 \u03B9\u03B4\u03B9\u03BF\u03C4\u03AE\u03C4\u03C9\u03BD, \u03C0\u03C1\u03BF\u03C3\u03B5\u03BA\u03C4\u03B9\u03BA\u03AE \u03C0\u03B1\u03C1\u03B1\u03BC\u03B5\u03C4\u03C1\u03BF\u03C0\u03BF\u03AF\u03B7\u03C3\u03B7 \u03C4\u03BF\u03C5 TLS \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03C0\u03B1\u03C1\u03AD\u03C7\u03B5\u03B9 \u03B5\u03C0\u03B9\u03C0\u03BB\u03AD\u03BF\u03BD \u03B9\u03B4\u03B9\u03CC\u03C4\u03B7\u03C4\u03B5\u03C2 \u03C3\u03C7\u03B5\u03C4\u03B9\u03BA\u03AD\u03C2 \u03BC\u03B5 \u03C4\u03B7\u03BD \u03B9\u03B4\u03B9\u03C9\u03C4\u03B9\u03BA\u03CC\u03C4\u03B7\u03C4\u03B1, \u03CC\u03C0\u03C9\u03C2 , \u03C0\u03B1\u03C1\u03AD\u03C7\u03BF\u03BD\u03C4\u03B1\u03C2 \u03C4\u03B7\u03BD \u03B5\u03B3\u03B3\u03CD\u03B7\u03C3\u03B7 \u03C0\u03C9\u03C2 \u03BF\u03C0\u03BF\u03B9\u03B1\u03B4\u03AE\u03C0\u03BF\u03C4\u03B5 \u03BC\u03B5\u03BB\u03BB\u03BF\u03BD\u03C4\u03B9\u03BA\u03AE \u03BA\u03BB\u03BF\u03C0\u03AE \u03BA\u03C1\u03C5\u03C0\u03C4\u03BF\u03B3\u03C1\u03B1\u03C6\u03B9\u03BA\u03CE\u03BD \u03BA\u03BB\u03B5\u03B9\u03B4\u03B9\u03CE\u03BD \u03B4\u03B5\u03BD \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03B2\u03BF\u03B7\u03B8\u03AE\u03C3\u03B5\u03B9 \u03C3\u03C4\u03B7\u03BD \u03B1\u03C0\u03BF\u03BA\u03C1\u03C5\u03C0\u03C4\u03BF\u03B3\u03C1\u03AC\u03C6\u03B7\u03C3\u03B7 \u03BF\u03C0\u03BF\u03B9\u03B1\u03C3\u03B4\u03AE\u03C0\u03BF\u03C4\u03B5 \u03C0\u03C1\u03BF\u03B7\u03B3\u03BF\u03CD\u03BC\u03B5\u03BD\u03B7\u03C2 \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03AF\u03B1\u03C2 \u03B1\u03C3\u03C6\u03B1\u03BB\u03B9\u03C3\u03BC\u03AD\u03BD\u03B7\u03C2 \u03BC\u03B5 TLS \u03B1\u03C0\u03CC \u03C4\u03BF \u03C0\u03B1\u03C1\u03B5\u03BB\u03B8\u03CC\u03BD. \u03A4\u03BF TLS \u03C5\u03C0\u03BF\u03C3\u03C4\u03B7\u03C1\u03AF\u03B6\u03B5\u03B9 \u03C0\u03BF\u03BB\u03BB\u03AD\u03C2 \u03B4\u03B9\u03B1\u03C6\u03BF\u03C1\u03B5\u03C4\u03B9\u03BA\u03AD\u03C2 \u03BC\u03B5\u03B8\u03CC\u03B4\u03BF\u03C5\u03C2 \u03B1\u03BD\u03C4\u03B1\u03BB\u03BB\u03B1\u03B3\u03AE\u03C2 \u03BA\u03BB\u03B5\u03B9\u03B4\u03B9\u03CE\u03BD, \u03BA\u03C1\u03C5\u03C0\u03C4\u03BF\u03B3\u03C1\u03AC\u03C6\u03B7\u03C3\u03B7\u03C2 \u03B4\u03B5\u03B4\u03BF\u03BC\u03AD\u03BD\u03C9\u03BD, \u03BA\u03B1\u03B9 \u03B1\u03C5\u03B8\u03B5\u03BD\u03C4\u03B9\u03BA\u03BF\u03C0\u03BF\u03AF\u03B7\u03C3\u03B7\u03C2 \u03B1\u03BA\u03B5\u03C1\u03B1\u03B9\u03CC\u03C4\u03B7\u03C4\u03B1\u03C2 \u03BC\u03B7\u03BD\u03C5\u03BC\u03AC\u03C4\u03C9\u03BD (\u03B2\u03BB. \u03C0\u03B1\u03C1\u03B1\u03BA\u03AC\u03C4\u03C9). \u03A9\u03C2 \u03B1\u03C0\u03BF\u03C4\u03AD\u03BB\u03B5\u03C3\u03BC\u03B1, \u03BC\u03B9\u03B1 \u03B1\u03C3\u03C6\u03B1\u03BB\u03AE\u03C2 \u03C0\u03B1\u03C1\u03B1\u03BC\u03B5\u03C4\u03C1\u03BF\u03C0\u03BF\u03AF\u03B7\u03C3\u03B7 \u03C4\u03BF\u03C5 TLS \u03C0\u03B5\u03C1\u03B9\u03BB\u03B1\u03BC\u03B2\u03AC\u03BD\u03B5\u03B9 \u03C4\u03B7\u03BD \u03B5\u03C0\u03B9\u03BB\u03BF\u03B3\u03AE \u03BC\u03B5\u03C4\u03B1\u03BE\u03CD \u03C0\u03BF\u03BB\u03BB\u03CE\u03BD \u03C0\u03B1\u03C1\u03B1\u03BC\u03AD\u03C4\u03C1\u03C9\u03BD, \u03BA\u03AC\u03C0\u03BF\u03B9\u03B5\u03C2 \u03B5\u03BA \u03C4\u03C9\u03BD \u03BF\u03C0\u03BF\u03AF\u03C9\u03BD \u03BC\u03CC\u03BD\u03BF \u03C0\u03B1\u03C1\u03AD\u03C7\u03BF\u03C5\u03BD \u03CC\u03BB\u03B5\u03C2 \u03C4\u03B9\u03C2 \u03C3\u03C7\u03B5\u03C4\u03B9\u03BA\u03AD\u03C2 \u03B9\u03B4\u03B9\u03CC\u03C4\u03B7\u03C4\u03B5\u03C2 \u03B9\u03B4\u03B9\u03C9\u03C4\u03B9\u03BA\u03CC\u03C4\u03B7\u03C4\u03B1\u03C2 \u03BA\u03B1\u03B9 \u03C0\u03B5\u03C1\u03B9\u03B3\u03C1\u03AC\u03C6\u03BF\u03BD\u03C4\u03B1\u03B9 \u03C3\u03C4\u03BF\u03BD , \u03C3\u03C4\u03BF\u03BD , \u03BA\u03B1\u03B9 \u03C3\u03C4\u03BF\u03BD ). \u03A0\u03C1\u03BF\u03C3\u03C0\u03AC\u03B8\u03B5\u03B9\u03B5\u03C2 \u03C0\u03BF\u03C5 \u03AD\u03C7\u03BF\u03C5\u03BD \u03B3\u03AF\u03BD\u03B5\u03B9 \u03B3\u03B9\u03B1 \u03C4\u03B7\u03BD \u03C0\u03B1\u03C1\u03B1\u03B2\u03AF\u03B1\u03C3\u03B7 \u03BF\u03C1\u03B9\u03C3\u03BC\u03AD\u03BD\u03C9\u03BD \u03B9\u03B4\u03B9\u03BF\u03C4\u03AE\u03C4\u03C9\u03BD \u03C4\u03B7\u03C2 \u03B1\u03C3\u03C6\u03AC\u03BB\u03B5\u03B9\u03B1\u03C2 \u03C4\u03C9\u03BD \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03AF\u03C9\u03BD \u03C0\u03BF\u03C5 \u03C0\u03B1\u03C1\u03AD\u03C7\u03B5\u03B9 \u03C4\u03BF TLS, \u03AD\u03C7\u03BF\u03C5\u03BD \u03BF\u03B4\u03B7\u03B3\u03AE\u03C3\u03B5\u03B9 \u03C3\u03B5 \u03B1\u03BB\u03BB\u03B1\u03B3\u03AD\u03C2 \u03C3\u03C4\u03BF \u03AF\u03B4\u03B9\u03BF \u03C4\u03BF \u03C0\u03C1\u03C9\u03C4\u03CC\u03BA\u03BF\u03BB\u03BB\u03BF \u03B3\u03B9\u03B1 \u03C4\u03B7\u03BD \u03C0\u03C1\u03BF\u03C3\u03C4\u03B1\u03C3\u03AF\u03B1 \u03B1\u03C0\u03AD\u03BD\u03B1\u03BD\u03C4\u03B9 \u03C3\u03B5 \u03C4\u03AD\u03C4\u03BF\u03B9\u03B5\u03C2 \u03B5\u03C0\u03B9\u03B8\u03AD\u03C3\u03B5\u03B9\u03C2 (\u03B2\u03BB. ). \u039F\u03B9 \u03C0\u03C1\u03BF\u03B3\u03C1\u03B1\u03BC\u03BC\u03B1\u03C4\u03B9\u03C3\u03C4\u03AD\u03C2 \u03C4\u03C9\u03BD \u03C0\u03B5\u03C1\u03B9\u03B7\u03B3\u03B7\u03C4\u03CE\u03BD \u03B9\u03C3\u03C4\u03BF\u03CD \u03AD\u03C7\u03BF\u03C5\u03BD \u03B5\u03C0\u03AF\u03C3\u03B7\u03C2 \u03C4\u03C1\u03BF\u03C0\u03BF\u03C0\u03BF\u03B9\u03AE\u03C3\u03B5\u03B9 \u03C4\u03B1 \u03C0\u03C1\u03BF\u03CA\u03CC\u03BD\u03C4\u03B1 \u03C4\u03BF\u03C5\u03C2 \u03B3\u03B9\u03B1 \u03BD\u03B1 \u03B1\u03BC\u03C5\u03BD\u03B8\u03BF\u03CD\u03BD \u03B1\u03C0\u03AD\u03BD\u03B1\u03BD\u03C4\u03B9 \u03C3\u03B5 \u03C0\u03B9\u03B8\u03B1\u03BD\u03AC \u03BA\u03B5\u03BD\u03AC \u03B1\u03C3\u03C6\u03B1\u03BB\u03B5\u03AF\u03B1\u03C2 \u03B1\u03C6\u03BF\u03CD \u03B1\u03C5\u03C4\u03AC \u03B5\u03BD\u03C4\u03BF\u03C0\u03AF\u03C3\u03C4\u03B7\u03BA\u03B1\u03BD (\u03B2\u03BB. ). \u03A4\u03BF \u03C0\u03C1\u03C9\u03C4\u03CC\u03BA\u03BF\u03BB\u03BB\u03BF TLS \u03B1\u03C0\u03BF\u03C4\u03B5\u03BB\u03B5\u03AF\u03C4\u03B1\u03B9 \u03B1\u03C0\u03CC \u03B4\u03CD\u03BF \u03B5\u03C0\u03AF\u03C0\u03B5\u03B4\u03B1, \u03C4\u03BF , \u03BA\u03B1\u03B9 \u03C4\u03BF . \u03A4\u03BF TLS \u03B5\u03AF\u03BD\u03B1\u03B9 \u03AD\u03BD\u03B1 \u03C0\u03C1\u03BF\u03C4\u03B5\u03B9\u03BD\u03CC\u03BC\u03B5\u03BD\u03BF \u03B1\u03C0\u03CC \u03C4\u03BF (IETF), \u03BA\u03B1\u03B9 \u03C0\u03C1\u03CE\u03C4\u03B1 \u03BF\u03C1\u03AF\u03C3\u03C4\u03B7\u03BA\u03B5 \u03C4\u03BF 1999 \u03BA\u03B1\u03B9 \u03AD\u03C0\u03B5\u03B9\u03C4\u03B1 \u03B1\u03BD\u03B1\u03BD\u03B5\u03CE\u03B8\u03B7\u03BA\u03B5 \u03C3\u03C4\u03BF RFC 5246 (\u0391\u03CD\u03B3\u03BF\u03C5\u03C3\u03C4\u03BF\u03C2 2008), \u03BA\u03B1\u03B9 \u03C3\u03C4\u03BF RFC 6176 (\u039C\u03AC\u03C1\u03C4\u03B9\u03BF\u03C2 2011). \u0392\u03B1\u03C3\u03AF\u03B6\u03B5\u03C4\u03B1\u03B9 \u03C0\u03AC\u03BD\u03C9 \u03C3\u03C4\u03B9\u03C2 \u03C0\u03C1\u03BF\u03B7\u03B3\u03BF\u03CD\u03BC\u03B5\u03BD\u03B5\u03C2 \u03B4\u03B7\u03BC\u03BF\u03C3\u03B9\u03B5\u03C5\u03BC\u03AD\u03BD\u03B5\u03C2 \u03C0\u03C1\u03BF\u03B4\u03B9\u03B1\u03B3\u03C1\u03B1\u03C6\u03AD\u03C2 \u03C4\u03BF\u03C5 SSL (1994, 1995, 1996) \u03C0\u03BF\u03C5 \u03B1\u03BD\u03B1\u03C0\u03C4\u03CD\u03C7\u03B8\u03B7\u03BA\u03B5 \u03B1\u03C0\u03CC \u03C4\u03B7\u03BD Communications \u03B3\u03B9\u03B1 \u03C4\u03B7\u03BD \u03C0\u03C1\u03BF\u03C3\u03B8\u03AE\u03BA\u03B7 \u03C4\u03BF\u03C5 \u03C0\u03C1\u03C9\u03C4\u03BF\u03BA\u03CC\u03BB\u03BB\u03BF\u03C5 HTTPS \u03C3\u03C4\u03BF \u03C0\u03B5\u03C1\u03B9\u03B7\u03B3\u03B7\u03C4\u03AE \u03C4\u03BF\u03C5\u03C2, ."@el . . . . . . . . . . . . "\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0637\u0628\u0642\u0629 \u0627\u0644\u0645\u0646\u0627\u0641\u0630 \u0627\u0644\u0622\u0645\u0646\u0629 (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: Secure Socket Layer)\u200F\u060C \u0627\u062E\u062A\u0635\u0627\u0631\u064B\u0627 (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: SSL)\u200F \u064A\u062A\u0636\u0645\u0646 \u0645\u0633\u062A\u0648\u0649 \u0639\u0627\u0644 \u0645\u0646 \u0627\u0644\u0623\u0645\u0646 \u0641\u064A \u0646\u0638\u0627\u0645 \u062A\u0633\u0644\u0633\u0644 \u0627\u0644\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644\u0627\u062A \u0627\u0644\u0647\u0631\u0645\u064A."@ar . . . . . . . . . "Transport Layer Security (TLS) e il suo predecessore Secure Sockets Layer (SSL) sono dei protocolli crittografici di presentazione usati nel campo delle telecomunicazioni e dell'informatica che permettono una comunicazione sicura dalla sorgente al destinatario (end-to-end) su reti TCP/IP (come ad esempio Internet) fornendo autenticazione, integrit\u00E0 dei dati e confidenzialit\u00E0 operando al di sopra del livello di trasporto."@it . . . . . . "O Transport Layer Security (TLS), assim como o seu antecessor Secure Sockets Layer (SSL), \u00E9 um protocolo de seguran\u00E7a projetado para fornecer sobre uma rede de computadores. V\u00E1rias vers\u00F5es do protocolo encontram amplo uso em aplicativos como , email, mensagens instant\u00E2neas e voz sobre IP (VoIP). Os sites podem usar o TLS para proteger todas as comunica\u00E7\u00F5es entre seus servidores e navegadores web. O protocolo TLS visa principalmente fornecer privacidade e integridade de dados entre dois ou mais aplicativos de computador que se comunicam. Quando protegidos por TLS, conex\u00F5es entre um cliente (por exemplo, um navegador da Web) e um servidor (por exemplo, wikipedia.org) devem ter uma ou mais das seguintes propriedades: \n* A conex\u00E3o \u00E9 privada (ou segura) porque a criptografia sim\u00E9trica \u00E9 usada para criptografar os dados transmitidos. As chaves para essa criptografia sim\u00E9trica s\u00E3o geradas exclusivamente para cada conex\u00E3o e s\u00E3o baseadas em um que foi negociado no in\u00EDcio da sess\u00E3o (veja \u00A7 Handshake TLS). O servidor e o cliente negociam os detalhes de qual algoritmo de criptografia e chaves criptogr\u00E1ficas usar antes que o primeiro byte de dados seja transmitido (ver \u00A7 Algoritmo abaixo). A negocia\u00E7\u00E3o de um segredo compartilhado \u00E9 segura (o segredo negociado n\u00E3o est\u00E1 dispon\u00EDvel para bisbilhoteiros e n\u00E3o pode ser obtido, mesmo por um invasor que se coloque no meio da conex\u00E3o) e confi\u00E1vel (nenhum invasor pode modificar as comunica\u00E7\u00F5es durante a negocia\u00E7\u00E3o sem ser detectado). \n* A identidade das partes em comunica\u00E7\u00E3o pode ser autenticada usando criptografia de chave p\u00FAblica. Essa autentica\u00E7\u00E3o pode ser opcional, mas geralmente \u00E9 necess\u00E1ria para pelo menos uma das partes (geralmente o servidor). \n* A conex\u00E3o \u00E9 confi\u00E1vel porque cada mensagem transmitida inclui uma verifica\u00E7\u00E3o de integridade de mensagem usando um c\u00F3digo de autentica\u00E7\u00E3o de mensagem para evitar perda n\u00E3o detectada ou altera\u00E7\u00E3o dos dados durante a transmiss\u00E3o. Al\u00E9m das propriedades acima, a configura\u00E7\u00E3o cuidadosa do TLS pode fornecer propriedades adicionais relacionadas \u00E0 privacidade, como sigilo de encaminhamento, garantindo que qualquer divulga\u00E7\u00E3o futura de chaves de criptografia n\u00E3o possa ser usada para descriptografar as comunica\u00E7\u00F5es TLS registradas no passado. O TLS suporta muitos m\u00E9todos diferentes para trocar chaves, criptografar dados e autenticar a integridade da mensagem (consulte \u00A7 Algoritmo abaixo). Como resultado, a configura\u00E7\u00E3o segura do TLS envolve muitos par\u00E2metros configur\u00E1veis \u200B\u200Be nem todas as op\u00E7\u00F5es fornecem todas as propriedades relacionadas \u00E0 privacidade descritas na lista acima (consulte \u00A7 Troca de chave (autentica\u00E7\u00E3o), \u00A7 Seguran\u00E7a de codifica\u00E7\u00E3o e \u00A7 Tabelas de integridade de dados). Tentativas foram feitas para subverter aspectos da seguran\u00E7a das comunica\u00E7\u00F5es que o TLS procura fornecer, e o protocolo foi revisado v\u00E1rias vezes para lidar com essas amea\u00E7as de seguran\u00E7a (ver \u00A7 Seguran\u00E7a). Os desenvolvedores de navegadores da Web tamb\u00E9m revisaram seus produtos para se defenderem de potenciais pontos fracos de seguran\u00E7a depois que eles foram descobertos (veja o hist\u00F3rico de suporte a TLS / SSL dos navegadores da Web). O protocolo TLS compreende duas camadas: o registro TLS e os protocolos de handshake TLS. O TLS \u00E9 um padr\u00E3o proposto pela IETF (Internet Engineering Task Force), definido pela primeira vez em 1999, e a vers\u00E3o atual \u00E9 o TLS 1.3 definido no RFC 8446 (agosto de 2018). O TLS baseia-se nas especifica\u00E7\u00F5es SSL anteriores (1994, 1995, 1996) desenvolvidas pela Netscape Communications para adicionar o protocolo HTTPS ao navegador da Web Navigator."@pt . "\u50B3\u8F38\u5C64\u5B89\u5168\u6027\u5354\u5B9A\uFF08\u82F1\u8A9E\uFF1ATransport Layer Security\uFF0C\u7E2E\u5BEB\uFF1ATLS\uFF09\u53CA\u5176\u524D\u8EAB\u5B89\u5168\u5957\u63A5\u5C42\uFF08\u82F1\u8A9E\uFF1ASecure Sockets Layer\uFF0C\u7E2E\u5BEB\uFF1ASSL\uFF09\u662F\u4E00\u79CD\u5B89\u5168\u534F\u8BAE\uFF0C\u76EE\u7684\u662F\u70BA\u7DB2\u969B\u7DB2\u8DEF\u901A\u4FE1\u63D0\u4F9B\u5B89\u5168\u53CA\u6570\u636E\u5B8C\u6574\u6027\u4FDD\u969C\u3002\u7DB2\u666F\u516C\u53F8\uFF08Netscape\uFF09\u57281994\u5E74\u63A8\u51FA\u9996\u7248\u7DB2\u9801\u700F\u89BD\u5668\uFF0D\u7DB2\u666F\u9818\u822A\u54E1\u6642\uFF0C\u63A8\u51FAHTTPS\u5354\u5B9A\uFF0C\u4EE5SSL\u9032\u884C\u52A0\u5BC6\uFF0C\u9019\u662FSSL\u7684\u8D77\u6E90\u3002IETF\u5C07SSL\u9032\u884C\u6A19\u6E96\u5316\uFF0C1999\u5E74\u516C\u5E03TLS 1.0\u6A19\u6E96\u6587\u4EF6\uFF08RFC 2246\uFF09\u3002\u96A8\u5F8C\u53C8\u516C\u5E03TLS 1.1\uFF08RFC 4346\uFF0C2006\u5E74\uFF09\u3001TLS 1.2\uFF08RFC 5246\uFF0C2008\u5E74\uFF09\u548CTLS 1.3\uFF08RFC 8446\uFF0C2018\u5E74\uFF09\u3002\u5728\u700F\u89BD\u5668\u3001\u96FB\u5B50\u90F5\u4EF6\u3001\u5373\u6642\u901A\u8A0A\u3001VoIP\u3001\u7DB2\u8DEF\u50B3\u771F\u7B49\u61C9\u7528\u7A0B\u5F0F\u4E2D\uFF0C\u5EE3\u6CDB\u4F7F\u7528\u9019\u500B\u5354\u5B9A\u3002\u8A31\u591A\u7DB2\u7AD9\uFF0C\u5982Google\u3001Facebook\u3001Wikipedia\u7B49\u4E5F\u4EE5\u9019\u500B\u5354\u5B9A\u4F86\u5EFA\u7ACB\u5B89\u5168\u9023\u7DDA\uFF0C\u50B3\u9001\u8CC7\u6599\u3002\u76EE\u524D\u5DF2\u6210\u4E3A\u4E92\u8054\u7F51\u4E0A\u4FDD\u5BC6\u901A\u4FE1\u7684\u5DE5\u4E1A\u6807\u51C6\u3002 SSL\u5305\u542B\u8BB0\u5F55\u5C42\uFF08Record Layer\uFF09\u548C\u4F20\u8F93\u5C42\uFF0C\u8BB0\u5F55\u5C42\u534F\u8BAE\u786E\u5B9A\u4F20\u8F93\u5C42\u6570\u636E\u7684\u5C01\u88C5\u683C\u5F0F\u3002\u50B3\u8F38\u5C64\u5B89\u5168\u5354\u8B70\u4F7F\u7528X.509\u8A8D\u8B49\uFF0C\u4E4B\u5F8C\u5229\u7528\u975E\u5C0D\u7A31\u52A0\u5BC6\u6F14\u7B97\u4F86\u5C0D\u901A\u8A0A\u65B9\u505A\u8EAB\u4EFD\u8A8D\u8B49\uFF0C\u4E4B\u5F8C\u4EA4\u63DB\u5C0D\u7A31\u5BC6\u5319\u4F5C\u70BA\u6703\u8BDD\u5BC6\u5319\uFF08Session key\uFF09\u3002\u9019\u500B\u6703\u8AC7\u5BC6\u5319\u662F\u7528\u4F86\u5C07\u901A\u8A0A\u5169\u65B9\u4EA4\u63DB\u7684\u8CC7\u6599\u505A\u52A0\u5BC6\uFF0C\u4FDD\u8BC1\u4E24\u4E2A\u5E94\u7528\u95F4\u901A\u4FE1\u7684\u4FDD\u5BC6\u6027\u548C\u53EF\u9760\u6027\uFF0C\u4F7F\u5BA2\u6237\u8207\u670D\u52A1\u5668\u5E94\u7528\u4E4B\u95F4\u7684\u901A\u4FE1\u4E0D\u88AB\u653B\u51FB\u8005\u7A83\u542C\u3002"@zh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Transport Layer Security"@ja . . . "Transport Layer Security"@it . "TLS (\u0430\u043D\u0433\u043B. Transport Layer Security \u2014 \u0437\u0430\u0445\u0438\u0441\u0442 \u043D\u0430 \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u043D\u043E\u043C\u0443 \u0440\u0456\u0432\u043D\u0456), \u044F\u043A \u0456 \u0439\u043E\u0433\u043E \u043F\u043E\u043F\u0435\u0440\u0435\u0434\u043D\u0438\u043A SSL \u2014 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0456\u0447\u043D\u0438\u0439 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B, \u0449\u043E \u043D\u0430\u0434\u0430\u0454 \u043C\u043E\u0436\u043B\u0438\u0432\u043E\u0441\u0442\u0456 \u0431\u0435\u0437\u043F\u0435\u0447\u043D\u043E\u0457 \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0434\u0430\u043D\u0438\u0445 \u0432 \u0456\u043D\u0442\u0435\u0440\u043D\u0435\u0442\u0456 \u0434\u043B\u044F \u043D\u0430\u0432\u0456\u0433\u0430\u0446\u0456\u0457, \u043E\u0442\u0440\u0438\u043C\u0430\u043D\u043D\u044F \u043F\u043E\u0448\u0442\u0438, \u0441\u043F\u0456\u043B\u043A\u0443\u0432\u0430\u043D\u043D\u044F, \u043E\u0431\u043C\u0456\u043D\u0443 \u0444\u0430\u0439\u043B\u0430\u043C\u0438, \u0442\u043E\u0449\u043E. \u0412\u0438\u043A\u043E\u0440\u0438\u0441\u0442\u043E\u0432\u0443\u0454 \u0430\u0441\u0438\u043C\u0435\u0442\u0440\u0438\u0447\u043D\u0435 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043D\u043D\u044F \u0456 \u0441\u0435\u0440\u0442\u0438\u0444\u0456\u043A\u0430\u0442\u0438 X.509."@uk . . . "\u50B3\u8F38\u5C64\u5B89\u5168\u6027\u5354\u5B9A\uFF08\u82F1\u8A9E\uFF1ATransport Layer Security\uFF0C\u7E2E\u5BEB\uFF1ATLS\uFF09\u53CA\u5176\u524D\u8EAB\u5B89\u5168\u5957\u63A5\u5C42\uFF08\u82F1\u8A9E\uFF1ASecure Sockets Layer\uFF0C\u7E2E\u5BEB\uFF1ASSL\uFF09\u662F\u4E00\u79CD\u5B89\u5168\u534F\u8BAE\uFF0C\u76EE\u7684\u662F\u70BA\u7DB2\u969B\u7DB2\u8DEF\u901A\u4FE1\u63D0\u4F9B\u5B89\u5168\u53CA\u6570\u636E\u5B8C\u6574\u6027\u4FDD\u969C\u3002\u7DB2\u666F\u516C\u53F8\uFF08Netscape\uFF09\u57281994\u5E74\u63A8\u51FA\u9996\u7248\u7DB2\u9801\u700F\u89BD\u5668\uFF0D\u7DB2\u666F\u9818\u822A\u54E1\u6642\uFF0C\u63A8\u51FAHTTPS\u5354\u5B9A\uFF0C\u4EE5SSL\u9032\u884C\u52A0\u5BC6\uFF0C\u9019\u662FSSL\u7684\u8D77\u6E90\u3002IETF\u5C07SSL\u9032\u884C\u6A19\u6E96\u5316\uFF0C1999\u5E74\u516C\u5E03TLS 1.0\u6A19\u6E96\u6587\u4EF6\uFF08RFC 2246\uFF09\u3002\u96A8\u5F8C\u53C8\u516C\u5E03TLS 1.1\uFF08RFC 4346\uFF0C2006\u5E74\uFF09\u3001TLS 1.2\uFF08RFC 5246\uFF0C2008\u5E74\uFF09\u548CTLS 1.3\uFF08RFC 8446\uFF0C2018\u5E74\uFF09\u3002\u5728\u700F\u89BD\u5668\u3001\u96FB\u5B50\u90F5\u4EF6\u3001\u5373\u6642\u901A\u8A0A\u3001VoIP\u3001\u7DB2\u8DEF\u50B3\u771F\u7B49\u61C9\u7528\u7A0B\u5F0F\u4E2D\uFF0C\u5EE3\u6CDB\u4F7F\u7528\u9019\u500B\u5354\u5B9A\u3002\u8A31\u591A\u7DB2\u7AD9\uFF0C\u5982Google\u3001Facebook\u3001Wikipedia\u7B49\u4E5F\u4EE5\u9019\u500B\u5354\u5B9A\u4F86\u5EFA\u7ACB\u5B89\u5168\u9023\u7DDA\uFF0C\u50B3\u9001\u8CC7\u6599\u3002\u76EE\u524D\u5DF2\u6210\u4E3A\u4E92\u8054\u7F51\u4E0A\u4FDD\u5BC6\u901A\u4FE1\u7684\u5DE5\u4E1A\u6807\u51C6\u3002 SSL\u5305\u542B\u8BB0\u5F55\u5C42\uFF08Record Layer\uFF09\u548C\u4F20\u8F93\u5C42\uFF0C\u8BB0\u5F55\u5C42\u534F\u8BAE\u786E\u5B9A\u4F20\u8F93\u5C42\u6570\u636E\u7684\u5C01\u88C5\u683C\u5F0F\u3002\u50B3\u8F38\u5C64\u5B89\u5168\u5354\u8B70\u4F7F\u7528X.509\u8A8D\u8B49\uFF0C\u4E4B\u5F8C\u5229\u7528\u975E\u5C0D\u7A31\u52A0\u5BC6\u6F14\u7B97\u4F86\u5C0D\u901A\u8A0A\u65B9\u505A\u8EAB\u4EFD\u8A8D\u8B49\uFF0C\u4E4B\u5F8C\u4EA4\u63DB\u5C0D\u7A31\u5BC6\u5319\u4F5C\u70BA\u6703\u8BDD\u5BC6\u5319\uFF08Session key\uFF09\u3002\u9019\u500B\u6703\u8AC7\u5BC6\u5319\u662F\u7528\u4F86\u5C07\u901A\u8A0A\u5169\u65B9\u4EA4\u63DB\u7684\u8CC7\u6599\u505A\u52A0\u5BC6\uFF0C\u4FDD\u8BC1\u4E24\u4E2A\u5E94\u7528\u95F4\u901A\u4FE1\u7684\u4FDD\u5BC6\u6027\u548C\u53EF\u9760\u6027\uFF0C\u4F7F\u5BA2\u6237\u8207\u670D\u52A1\u5668\u5E94\u7528\u4E4B\u95F4\u7684\u901A\u4FE1\u4E0D\u88AB\u653B\u51FB\u8005\u7A83\u542C\u3002"@zh . . . . . . . . . . . . . . "Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography, such as the use of certificates, between two or more communicating computer applications. It runs in the presentation layer and is itself composed of two layers: the TLS record and the TLS handshake protocols. The closely related Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications. In technical writing you often you will see references to (D)TLS when it applies to both versions. TLS is a proposed Internet Engineering Task Force (IETF) standard, first defined in 1999, and the current version is TLS 1.3, defined in August 2018. TLS builds on the now-deprecated SSL (Secure Sockets Layer) specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Navigator web browser."@en . . . . "Transport Layer Security"@pl . . . . . . "TLS (\u0430\u043D\u0433\u043B. transport layer security \u2014 \u041F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u043D\u043E\u0433\u043E \u0443\u0440\u043E\u0432\u043D\u044F), \u043A\u0430\u043A \u0438 \u0435\u0433\u043E \u043F\u0440\u0435\u0434\u0448\u0435\u0441\u0442\u0432\u0435\u043D\u043D\u0438\u043A SSL (\u0430\u043D\u0433\u043B. secure sockets layer \u2014 \u0441\u043B\u043E\u0439 \u0437\u0430\u0449\u0438\u0449\u0451\u043D\u043D\u044B\u0445 \u0441\u043E\u043A\u0435\u0442\u043E\u0432), \u2014 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043A\u0438\u0435 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u044B, \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0438\u0432\u0430\u044E\u0449\u0438\u0435 \u0437\u0430\u0449\u0438\u0449\u0451\u043D\u043D\u0443\u044E \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0443 \u0434\u0430\u043D\u043D\u044B\u0445 \u043C\u0435\u0436\u0434\u0443 \u0443\u0437\u043B\u0430\u043C\u0438 \u0432 \u0441\u0435\u0442\u0438 \u0418\u043D\u0442\u0435\u0440\u043D\u0435\u0442. TLS \u0438 SSL \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u044E\u0442 \u0430\u0441\u0438\u043C\u043C\u0435\u0442\u0440\u0438\u0447\u043D\u043E\u0435 \u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u0435 \u0434\u043B\u044F \u0430\u0443\u0442\u0435\u043D\u0442\u0438\u0444\u0438\u043A\u0430\u0446\u0438\u0438, \u0441\u0438\u043C\u043C\u0435\u0442\u0440\u0438\u0447\u043D\u043E\u0435 \u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u0435 \u0434\u043B\u044F \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u043E\u0441\u0442\u0438 \u0438 \u043A\u043E\u0434\u044B \u0430\u0443\u0442\u0435\u043D\u0442\u0438\u0447\u043D\u043E\u0441\u0442\u0438 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0439 \u0434\u043B\u044F \u0441\u043E\u0445\u0440\u0430\u043D\u0435\u043D\u0438\u044F \u0446\u0435\u043B\u043E\u0441\u0442\u043D\u043E\u0441\u0442\u0438 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0439. \u0414\u0430\u043D\u043D\u044B\u0439 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0448\u0438\u0440\u043E\u043A\u043E \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442\u0441\u044F \u0432 \u043F\u0440\u0438\u043B\u043E\u0436\u0435\u043D\u0438\u044F\u0445, \u0440\u0430\u0431\u043E\u0442\u0430\u044E\u0449\u0438\u0445 \u0441 \u0441\u0435\u0442\u044C\u044E \u0418\u043D\u0442\u0435\u0440\u043D\u0435\u0442, \u0442\u0430\u043A\u0438\u0445 \u043A\u0430\u043A \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u044B, \u0440\u0430\u0431\u043E\u0442\u0430 \u0441 \u044D\u043B\u0435\u043A\u0442\u0440\u043E\u043D\u043D\u043E\u0439 \u043F\u043E\u0447\u0442\u043E\u0439, \u043E\u0431\u043C\u0435\u043D \u043C\u0433\u043D\u043E\u0432\u0435\u043D\u043D\u044B\u043C\u0438 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F\u043C\u0438 \u0438 IP-\u0442\u0435\u043B\u0435\u0444\u043E\u043D\u0438\u044F (VoIP). TLS-\u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u043E\u0441\u043D\u043E\u0432\u0430\u043D \u043D\u0430 \u0441\u043F\u0435\u0446\u0438\u0444\u0438\u043A\u0430\u0446\u0438\u0438 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0430 SSL \u0432\u0435\u0440\u0441\u0438\u0438 3.0, \u0440\u0430\u0437\u0440\u0430\u0431\u043E\u0442\u0430\u043D\u043D\u043E\u0439 \u043A\u043E\u043C\u043F\u0430\u043D\u0438\u0435\u0439 Netscape Communications.\u0421\u0435\u0439\u0447\u0430\u0441 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435\u043C \u0441\u0442\u0430\u043D\u0434\u0430\u0440\u0442\u0430 TLS \u0437\u0430\u043D\u0438\u043C\u0430\u0435\u0442\u0441\u044F IETF. \u041F\u043E\u0441\u043B\u0435\u0434\u043D\u0435\u0435 \u043E\u0431\u043D\u043E\u0432\u043B\u0435\u043D\u0438\u0435 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0430 \u0431\u044B\u043B\u043E \u0432 RFC 5246 (\u0430\u0432\u0433\u0443\u0441\u0442 2008) \u0438 RFC 6176 (\u043C\u0430\u0440\u0442 2011)."@ru . . . . . . "Transport Layer Security\uFF08\u30C8\u30E9\u30F3\u30B9\u30DD\u30FC\u30C8\u30FB\u30EC\u30A4\u30E4\u30FC\u30FB\u30BB\u30AD\u30E5\u30EA\u30C6\u30A3\u3001TLS\uFF09\u306F\u3001\u30A4\u30F3\u30BF\u30FC\u30CD\u30C3\u30C8\u306A\u3069\u306E\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u306B\u304A\u3044\u3066\u30BB\u30AD\u30E5\u30EA\u30C6\u30A3\u3092\u8981\u6C42\u3055\u308C\u308B\u901A\u4FE1\u3092\u884C\u3046\u305F\u3081\u306E\u30D7\u30ED\u30C8\u30B3\u30EB\u3067\u3042\u308B\u3002\u4E3B\u306A\u6A5F\u80FD\u3068\u3057\u3066\u3001\u901A\u4FE1\u76F8\u624B\u306E\u8A8D\u8A3C\u3001\u901A\u4FE1\u5185\u5BB9\u306E\u6697\u53F7\u5316\u3001\u6539\u7AC4\u306E\u691C\u51FA\u3092\u63D0\u4F9B\u3059\u308B\u3002TLS\u306FIETF\u306B\u3088\u3063\u3066\u7B56\u5B9A\u3055\u308C\u305F\u3002 \u5F53\u30D7\u30ED\u30C8\u30B3\u30EB\u306F\uFF08\u7279\u306B\u533A\u5225\u3059\u308B\u5834\u5408\u3092\u9664\u3044\u3066\uFF09SSL (Secure Sockets Layer) \u3068\u547C\u3070\u308C\u308B\u3053\u3068\u3082\u591A\u3044\u3002\u3053\u308C\u306F\u3001TLS\u306E\u5143\u306B\u306A\u3063\u305F\u30D7\u30ED\u30C8\u30B3\u30EB\u304CSSL\u3067\u3042\u308A\u3001\u305D\u306ESSL\u3068\u3044\u3046\u540D\u79F0\u304C\u5E83\u304F\u666E\u53CA\u3057\u3066\u3044\u308B\u3053\u3068\u306B\u3088\u308B\u3002 2022\u5E74\u73FE\u5728\u306E\u6700\u65B0\u7248\u306FTLS 1.3\u3067\u3042\u308B\u3002"@ja . . . . . . . . . . . . . . . . . . . "Transport Layer Security"@eu . . . . . "Transport Layer Security (TLS) en diens voorganger Secure Sockets Layer (SSL), zijn encryptie-protocollen die de communicatie tussen computers (bijvoorbeeld op het internet) beveiligen."@nl . "Protokol Transport Layer Security (TLS) a jeho p\u0159edch\u016Fdce Secure Sockets Layer (SSL) jsou kryptografick\u00E9 protokoly poskytuj\u00EDc\u00ED mo\u017Enost komunikace na Internetu pro slu\u017Eby jako WWW, elektronick\u00E1 po\u0161ta, a dal\u0161\u00ED datov\u00E9 p\u0159enosy. Mezi protokoly SSL 3.0 a TLS 1.0 jsou drobn\u00E9 rozd\u00EDly, ale v z\u00E1sad\u011B jsou stejn\u00E9. Zde pou\u017Eit\u00FD term\u00EDn \u201ETLS\u201C se t\u00FDk\u00E1 obou dvou, pokud nen\u00ED z kontextu z\u0159ejm\u00FD opak."@cs . . . "Transport Layer Security\uFF08\u30C8\u30E9\u30F3\u30B9\u30DD\u30FC\u30C8\u30FB\u30EC\u30A4\u30E4\u30FC\u30FB\u30BB\u30AD\u30E5\u30EA\u30C6\u30A3\u3001TLS\uFF09\u306F\u3001\u30A4\u30F3\u30BF\u30FC\u30CD\u30C3\u30C8\u306A\u3069\u306E\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u306B\u304A\u3044\u3066\u30BB\u30AD\u30E5\u30EA\u30C6\u30A3\u3092\u8981\u6C42\u3055\u308C\u308B\u901A\u4FE1\u3092\u884C\u3046\u305F\u3081\u306E\u30D7\u30ED\u30C8\u30B3\u30EB\u3067\u3042\u308B\u3002\u4E3B\u306A\u6A5F\u80FD\u3068\u3057\u3066\u3001\u901A\u4FE1\u76F8\u624B\u306E\u8A8D\u8A3C\u3001\u901A\u4FE1\u5185\u5BB9\u306E\u6697\u53F7\u5316\u3001\u6539\u7AC4\u306E\u691C\u51FA\u3092\u63D0\u4F9B\u3059\u308B\u3002TLS\u306FIETF\u306B\u3088\u3063\u3066\u7B56\u5B9A\u3055\u308C\u305F\u3002 \u5F53\u30D7\u30ED\u30C8\u30B3\u30EB\u306F\uFF08\u7279\u306B\u533A\u5225\u3059\u308B\u5834\u5408\u3092\u9664\u3044\u3066\uFF09SSL (Secure Sockets Layer) \u3068\u547C\u3070\u308C\u308B\u3053\u3068\u3082\u591A\u3044\u3002\u3053\u308C\u306F\u3001TLS\u306E\u5143\u306B\u306A\u3063\u305F\u30D7\u30ED\u30C8\u30B3\u30EB\u304CSSL\u3067\u3042\u308A\u3001\u305D\u306ESSL\u3068\u3044\u3046\u540D\u79F0\u304C\u5E83\u304F\u666E\u53CA\u3057\u3066\u3044\u308B\u3053\u3068\u306B\u3088\u308B\u3002 2022\u5E74\u73FE\u5728\u306E\u6700\u65B0\u7248\u306FTLS 1.3\u3067\u3042\u308B\u3002"@ja . . "TLS (reto)"@eo . "Transport Layer Security"@cs . "TLS estas mallongigo de Transport Layer Security, kaj same kiel ties anta\u016Dulo, Secure Sockets Layer (SSL) amba\u016D estas kriptigita protokolo por interreto. Ili havigas komunikan sekurecon al komputila reto. Kelkaj versioj de tiuj protokoloj trovas disvastigitan uzadon en aplika\u0135oj kiaj interreta navigado, retpo\u015Dto, interret faksado, tujmesa\u011Dado, kaj interreta telefonado (VoIP). Retejoj povas uzi TLS por sekurigi \u0109iujn komunika\u0135ojn inter siaj serviloj kaj uzantoj."@eo . . . "Transport Layer Security"@uk . . "TLS (ang. Transport Layer Security) \u2013 przyj\u0119te jako standard w Internecie rozwini\u0119cie protoko\u0142u SSL (ang. Secure Socket Layer), zaprojektowanego pierwotnie przez Netscape Communications. TLS zapewnia poufno\u015B\u0107 i integralno\u015B\u0107 transmisji danych, a tak\u017Ce uwierzytelnienie serwera, a niekiedy r\u00F3wnie\u017C klienta. Opiera si\u0119 na szyfrowaniu asymetrycznym oraz certyfikatach X.509. W sierpniu 2018 r. wprowadzono wersj\u0119 1.3 tego protoko\u0142u jako aktualn\u0105."@pl . . . . . . . . . "169214"^^ . . . . "TLS"@ru . . . . . . . . . . . . "Transport Layer Security (TLS), dan pendahulunya yang sudah usang, Secure Sockets Layer (SSL), adalah protokol kriptografi yang dirancang untuk memberikan keamanan komunikasi melalui jaringan komputer. Beberapa versi protokol TLS dapat ditemukan penerapannya secara luas seperti di peramban web, surel, pesan instan, dan voice over IP (VoIP). Situs web dapat menggunakan TLS untuk mengamankan semua komunikasi antara peladen dan peramban web. Protokol TLS bertujuan terutama untuk memberikan privasi dan antara dua atau lebih aplikasi komputer yang berkomunikasi. Ketika diamankan oleh TLS, koneksi antara klien (misalnya, peramban web) dan peladen (misalnya, wikipedia.org) harus memiliki satu atau beberapa properti berikut: \n* Koneksi bersifat pribadi (atau aman) karena digunakan untuk mengenkripsi data yang dikirimkan. Kunci untuk enkripsi simetris ini dihasilkan secara unik untuk setiap koneksi dan didasarkan pada rahasia bersama yang dinegosiasikan pada awal . Peladen dan klien menegosiasikan perincian algoritma enkripsi dan kunci kriptografi mana yang digunakan sebelum bita pertama data ditransmisikan. Negosiasi rahasia bersama aman (rahasia yang dinegosiasikan tidak tersedia untuk dan tidak dapat diperoleh, bahkan oleh penyerang yang menempatkan diri di tengah-tengah koneksi) dan dapat diandalkan (tidak ada penyerang dapat memodifikasi komunikasi selama negosiasi tanpa menjadi terdeteksi). \n* Identitas pihak yang berkomunikasi dapat diautentikasi menggunakan . Otentikasi ini dapat dibuat opsional, tetapi umumnya diperlukan untuk setidaknya salah satu pihak (biasanya peladen). \n* Koneksi ini dapat diandalkan karena setiap pesan yang dikirim mencakup pemeriksaan integritas pesan menggunakan kode otentikasi pesan untuk mencegah kehilangan atau perubahan data yang tidak terdeteksi selama transmisi. Selain properti di atas, TLS yang hati-hati dapat memberikan properti terkait privasi tambahan seperti forward secrecy, memastikan bahwa setiap pengungkapan kunci enkripsi di masa depan tidak dapat digunakan untuk mendekripsi setiap komunikasi TLS yang direkam yang sebelumnya."@in . . . . . . . . . . . . . . . . . . . . "\uC804\uC1A1 \uACC4\uCE35 \uBCF4\uC548"@ko . . "Seguridad de la capa de transporte (en ingl\u00E9s: Transport Layer Security o TLS) y su antecesor Secure Sockets Layer (SSL; en espa\u00F1ol capa de puertos seguros) son protocolos criptogr\u00E1ficos, que proporcionan comunicaciones seguras por una red, com\u00FAnmente Internet.\u200B"@es . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "TLS estas mallongigo de Transport Layer Security, kaj same kiel ties anta\u016Dulo, Secure Sockets Layer (SSL) amba\u016D estas kriptigita protokolo por interreto. Ili havigas komunikan sekurecon al komputila reto. Kelkaj versioj de tiuj protokoloj trovas disvastigitan uzadon en aplika\u0135oj kiaj interreta navigado, retpo\u015Dto, interret faksado, tujmesa\u011Dado, kaj interreta telefonado (VoIP). Retejoj povas uzi TLS por sekurigi \u0109iujn komunika\u0135ojn inter siaj serviloj kaj uzantoj."@eo . . . "Transport Layer Security (TLS), \u2019transportlagers\u00E4kerhet\u2019, \u00E4r ett kryptografiskt kommunikationsprotokoll som \u00E4r en \u00F6ppen standard f\u00F6r s\u00E4kert utbyte av krypterad information mellan datorsystem. TLS \u00E4r en vidareutveckling av version 3 av SSL-protokollet, och st\u00E5r under IETF:s kontroll. Den f\u00F6rsta versionen av TLS, The TLS Protocol Version 1.0, publicerades den 27 januari 1999. TLS kan anv\u00E4ndas med flera olika protokoll, s\u00E5som \u201DHTTPS\u201D (egentligen protokollet HTTP med till\u00E4gget \u201DS\u201D (secure) som indikerar att det anv\u00E4nds \u00F6ver TLS (eller SSL)), FTPS, IMAP, POP3 och SMTP."@sv . . . . "Seguridad de la capa de transporte (en ingl\u00E9s: Transport Layer Security o TLS) y su antecesor Secure Sockets Layer (SSL; en espa\u00F1ol capa de puertos seguros) son protocolos criptogr\u00E1ficos, que proporcionan comunicaciones seguras por una red, com\u00FAnmente Internet.\u200B Se usan certificados X.509 y por lo tanto criptograf\u00EDa asim\u00E9trica para autentificar a la contraparte con quien se est\u00E1n comunicando,\u200B y para intercambiar una llave sim\u00E9trica. Esta sesi\u00F3n es luego usada para cifrar el flujo de datos entre las partes. Esto permite la confidencialidad del dato/mensaje, c\u00F3digos de autenticaci\u00F3n de mensajes para integridad y como un producto lateral, autenticaci\u00F3n del mensaje. Varias versiones del protocolo est\u00E1n en aplicaciones ampliamente utilizadas como navegaci\u00F3n web, correo electr\u00F3nico, fax por Internet, mensajer\u00EDa instant\u00E1nea y voz-sobre-IP (VoIP). Una propiedad importante en este contexto es forward secrecy, para que la clave de corta vida de la sesi\u00F3n no pueda ser descubierta a partir de la clave asim\u00E9trica de largo plazo.\u200B TLS es un protocolo de Internet Engineering Task Force (IETF), definido por primera vez en 1999 y actualizado en el RFC 5246 (agosto de 2008) y en RFC 6176 (marzo de 2011). Se basa en las especificaciones previas de SSL (1994, 1995, 1996) desarrolladas por Netscape Communications\u200B para agregar el protocolo HTTPS a su navegador Netscape Navigator. Su \u00FAltima versi\u00F3n, TLS 1.3, fue definida en agosto de 2018.\u200B"@es . . . . . . . . . . . . . . . . . . . . . "\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0637\u0628\u0642\u0629 \u0627\u0644\u0645\u0646\u0627\u0641\u0630 \u0627\u0644\u0622\u0645\u0646\u0629 (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: Secure Socket Layer)\u200F\u060C \u0627\u062E\u062A\u0635\u0627\u0631\u064B\u0627 (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: SSL)\u200F \u064A\u062A\u0636\u0645\u0646 \u0645\u0633\u062A\u0648\u0649 \u0639\u0627\u0644 \u0645\u0646 \u0627\u0644\u0623\u0645\u0646 \u0641\u064A \u0646\u0638\u0627\u0645 \u062A\u0633\u0644\u0633\u0644 \u0627\u0644\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644\u0627\u062A \u0627\u0644\u0647\u0631\u0645\u064A."@ar .