Unformatted text preview: ne number for the receiving
channel and one for the sending channel. These keys are
encrypted using the server's public key and then transmitted
to the server.
The client issues a challenge (some text encrypted with the
send key) to the server using the send symmetric key and
waits for a response from the server that is using the receive
Optional, server authenticates client
Data is exchanged across the secure channel.
Data Handshake protocol in SSL Secure Electronic Transactions
• open encryption & security specification
to protect Internet credit card transactions
developed in 1996 by Mastercard, Visa etc
not a payment system
rather a set of security protocols & formats
– secure communications amongst parties
– trust from use of X.509v3 certificates
– privacy by restricted info to those who need it Cryptographic Techniques
• Secret Key Algorithm
Public Key Algorithm
Secure Hash Function
Certificate Authority Secret Key Algorithm
Secret S e c re t K e y S e c re t K e y E n c r y p t io n
C le a r T e x t D e c r y p tio n
C le a r T e x t C ip h e r T e x t
Bob A lic e Public Key Algorithm
Public A lic e 's...
View Full Document
This note was uploaded on 06/03/2013 for the course IS e.g.101 taught by Professor Dr.mahmoudmostafa during the Fall '12 term at Ain Shams University.
- Fall '12