- Information
- AI Chat
Was this document helpful?
Handshake Protocol - Study thoroughly
Course: Computer network security (BC-504)
12 Documents
Students shared 12 documents in this course
University: Manipur University
Was this document helpful?
Handshake Protocol
The most complex part of SSL is the Handshake Protocol. This protocol allows the server and client
to authenticate each other and to negotiate an encryption and MAC algorithm and cryptographic keys
to be used to protect data sent in an SSL record. The Handshake Protocol is used before any
application data is transmitted.
The Handshake Protocol consists of a series of messages exchanged by client and server. All of these
have the format shown in Figure below. Each message has three fields:
● Type (1 byte): Indicates one of 10 messages. Table 17.2 lists the defined message types.
● Length (3 bytes): The length of the message in bytes.
● Content (0 bytes): The parameters associated with this message; these are listed in Table
17.2.
Table 17.2. SSL Handshake Protocol Message Types
Message Type
Parameters
hello_request
null
client_hello
version, random, session id, cipher suite, compression method
server_hello
version, random, session id, cipher suite, compression method
certificate
chain of X.509v3 certificates
server_key_exchange
parameters, signature
certificate_request
type, authorities
server_done
null
certificate_verify
signature
client_key_exchange
parameters, signature
finished
hash value
Figure 17.6 shows the initial exchange needed to establish a logical connection between client and
server. The exchange can be viewed as having four phases