Breaking TLS security by fully recording the handshake

微笑、不失礼 提交于 2019-12-02 07:25:06

The critical data sent by the client to the server in the TLS handshake is encrypted using the server's public key. So even if the packets are captured on the wire, it would require the private key (which is assumed to be known only to the server) to decrypt the packets.

Bruno

The main purpose of the handshake is to ensure the secret exchange of a pre master secret that is then shared by both parties (which then leads to a common master secret and shared encryption keys).

How this is done depends on the cipher suites, and which key exchange algorithm is used. Using authenticated key exchange, there are mainly two variants:

  • RSA key exchange, where the client encrypts the pre-master secret with the server's public key (obtained from the certificate).
  • Diffie-Hellman key exchange, where the client verifies the server's signed DH parameters with the server's public key.

You may be interested in these links:

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!