0% found this document useful (0 votes)
55 views

Lab 3

This lab report summarizes the key steps of the TLS handshake protocol between a client and server: 1) The client and server exchange hello messages to agree on encryption algorithms and parameters for the secure session. 2) The server sends its certificate to the client for authentication. 3) The client and server exchange key information to establish shared secret keys for encryption. 4) Change cipher spec messages are exchanged to signal the transition to the negotiated encryption algorithms. 5) Application data can then be sent securely over the connection until an alert message closes the connection.

Uploaded by

Vadim Ciubotaru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Lab 3

This lab report summarizes the key steps of the TLS handshake protocol between a client and server: 1) The client and server exchange hello messages to agree on encryption algorithms and parameters for the secure session. 2) The server sends its certificate to the client for authentication. 3) The client and server exchange key information to establish shared secret keys for encryption. 4) Change cipher spec messages are exchanged to signal the transition to the negotiated encryption algorithms. 5) Application data can then be sent securely over the connection until an alert message closes the connection.

Uploaded by

Vadim Ciubotaru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Ministerul Educației al Republicii Moldova

Universitatea Tehnică a Moldovei


Facultatea Calculatoare, Informatica și Microelectronică

Raport
Lucrarea de laborator nr. 3
La disciplina: Securitatea tranzacțiilor electronice
Tema: Protocoalele TLS-SSL
.

A efectuat: st. gr. SI-211M Ciubotaru Vadim


st. gr. SI-211M Mistreanu Valentin
A verificat: Bolun Ion

Chișinău 2022
Open a Trace
1. Inspect the Trace

2. The SSL Handshake


The session ID sent by the server is 32 bytes long. This identifier allows later resumption of the
session with an abbreviated handshake when both the client and server indicate the same value. In
our case, the client likely sent no session ID as there was nothing to resume (see below)

The Cipher method chosen by the Server is TLS_RSA_WITH_RC4_128_SHA (0x0005). The Client will list
the different cipher methods it supports, and the Server will pick one of these methods to use.

3. Certificate Messages
4. Client Key Exchange and Change Cipher Messages

Find and inspect the details of the Client Key Exchange and Change Cipher messages i.e. packet #9
(see below)

The key exchange message is sent to pass keying information so that both sides will have the
same secret session key. The change cipher message signal a switch to a new encryption scheme to
the other party. This means that it is the last unencrypted message sent by the party. Note how the
Client Key Exchange has a Content-Type of 22, indicating the Handshake protocol. This is the same
as for the Hello and Certificate messages, as they are part of the Handshake protocol.

The Change Cipher Spec message has a Content-Type of 20, indicating the Change Cipher Spec
protocol (see packet #10 – see below).
5. Find and inspect the details of an Alert message at the end of the trace (packet #42).

Note, the Content-Type value is 21 for Alert. This is a new protocol, different from the
Handshake, Change Cipher Spec and Application Data values that we have already seen. The
alert is encrypted; we cannot see its contents. Wireshark also describes the message as an
“Encrypted Alert”. Presumably is it a “close_notify” alert to signal that the connection is ending,
but we cannot be certain

You might also like