Upload
keithrozario
View
1.867
Download
4
Embed Size (px)
DESCRIPTION
Citation preview
SSL WalkthroughHigh level view of SSL
keithrozario.com
Step 1: Client accesses website
Client
Browser connects to website Web Server
Step 2: Server responds with Certificate
Client
Server responds with Certificate and key Web Server
Step 3: Client verifies with CA
Client Web Server
CA
Client verifies certificate with CA
Step 4: Client sends random key to server
Client Web Server
Random Key
Client sends a random key to server encrypted with the public key
Step 5: All communications are now encrypted with the Random key
Client Web Server
Random Key
Notes
All data encrypted with the servers public key can only be decrypted by the servers private key
The randomly generated key was: Randomly Generated by the client Encrypted with the servers public key
Only the Server and the Client would know the key, and unless they share it no one else would know.
Therefore encrypting the Data with the random key secures the data from prying eyes.
In most applications of SSL/TLS the key type, cipher and hash can be configured based on client and server requirements. It is this that determines the security of your connection, although SSL isn’t without it’s vulnerabilities.