Archive
SCIENTIFIC RESEARCH - 2026 SCIENTIFIC RESEARCH-2025 SCIENTIFIC RESEARCH 2024 SCIENTIFIC RESEARCH 2023 SCIENTIFIC RESEARCH 2022 SCIENTIFIC RESEARCH 2021

DOI:  https://doi.org/10.36719/2789-6919/56/216-221

Rovshan Khalilli

                                                                                           Odlar Yurdu University

Master’s student

https://orcid.org/0009-0002-0842-5057

rovsenxelilli50@gmail.com

 

Comparative Analysis of Security Mechanisms in SSLTLS, HTTPS, and VPN Protocols

 

Abstract

In the modern information society, information security and network protection are considered one of the main priorities. Various cryptographic protocols are used to ensure the confidentiality, integrity and authentication of data transmitted over the Internet. The purpose of the study is to conduct a comparative analysis of the security mechanisms applied in the SSL/TLS, HTTPS and VPN protocols, to systematically examine their cryptographic structures, authentication methods, encryption algorithms and application areas. Symmetric and asymmetric encryption methods, digital certificate infrastructure (PKI), key exchange mechanisms (for example, Diffie-Hellman), as well as tunneling and network-level protection mechanisms are analyzed. The SSL/TLS protocol provides encrypted data transmission by creating a secure channel mainly at the transport level. HTTPS is a secure version of the HTTP protocol over TLS and is mainly used in the web environment. VPN technologies, on the other hand, provide complex protection at both the application and network levels by creating an encrypted tunnel between the user and the remote network. Comparative analysis shows that SSL/TLS and HTTPS mainly focus on application-level security mechanisms, while VPN provides broader protection capabilities at the network infrastructure level. However, there are certain differences between these technologies in terms of performance, management complexity, application scope, and security level. In conclusion, the study shows that choosing the appropriate protocol according to specific security requirements plays an important role in ensuring the sustainability and cybersecurity of information systems.

Keywords: VPN, cryptography, encryption, authentication, PKI, digital certificate, key exchange, tunneling, cybersecurity, network security

 

 


Views: 90