Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.

What will be an ideal response?


ANSWER: Given the scenario of a browser accessing a secure Web site, the SSL/TLS handshake works as follows
1. The browser, representing the client computer in this scenario, sends a client_hello message to the Web server, which contains information about what level of security the browser is capable of accepting and what type of encryption the browser can decipher. The client_hello message also establishes a randomly generated number that uniquely identifies the client and another number that identifies the SSL session.
2. The server responds with a server_hello message that confirms the information it received from the browser and agrees to certain terms of encryption based on the options supplied by the browser. Depending on the Web server' s preferred encryption method, the server may choose to issue to the browser a public key or a digital certificate.
3. If the server requests a certificate from the browser, the browser sends it. Any data the browser sends to the server is encrypted using the server' s public key. Session keys used only for this one session are also established.

Computer Science & Information Technology

You might also like to view...

You access public members of a class object with ___________.

a. the getData method b. the access operator c. the dot operator d. a public module

Computer Science & Information Technology

Which of these is NOT a problem you might encounter in porting a program from a Mac to the PC (or from the PC to Mac)?

a. Bitmapped images are larger on a PC. b. Font sizes and shapes are slightly different. c. Special characters are not the same. d. Graphics with 256 colors have different colors. e. All are potential problems.

Computer Science & Information Technology

The term ____________________ management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

UTP is a type of ________ used in a wired network to connect a device to the router

Fill in the blank(s) with correct word

Computer Science & Information Technology