0% found this document useful (0 votes)
8 views8 pages

SSL Handshake Protocol Phases VTU

The SSL Handshake Protocol establishes a secure communication channel between a client and server, ensuring authentication, confidentiality, and data integrity. It involves four phases: establishing security capabilities, server authentication and key exchange, client authentication and key exchange, and the finish phase, which initiates encrypted data exchange. This process is essential for secure online communication.

Uploaded by

Johnny GAMER
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

SSL Handshake Protocol Phases VTU

The SSL Handshake Protocol establishes a secure communication channel between a client and server, ensuring authentication, confidentiality, and data integrity. It involves four phases: establishing security capabilities, server authentication and key exchange, client authentication and key exchange, and the finish phase, which initiates encrypted data exchange. This process is essential for secure online communication.

Uploaded by

Johnny GAMER
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SSL Handshake Protocol - Phases

Elements of Cybersecurity | VTU 4th


Sem | 2022 Scheme
Introduction to SSL Handshake
• The SSL Handshake Protocol is used to
establish a secure communication channel
between a client and server. It ensures
authentication, confidentiality, and data
integrity.
1. Establish Security Capabilities
• - Client sends ClientHello (version, cipher
suites, random number, session ID)
• - Server replies with ServerHello (selected
version, cipher suite, server random number)
• → Sets rules for communication.
2. Server Authentication and Key
Exchange
• - Server sends digital certificate to client
• - May send ServerKeyExchange and
CertificateRequest
• - Client verifies certificate using CA
• → Ensures server identity and shares key
exchange info.
3. Client Authentication and Key
Exchange
• - Client sends its certificate (optional)
• - Sends pre-master secret encrypted with
server's public key
• - Both sides generate shared session key
• → Confirms client identity and establishes
session key.
4. Finish Phase
• - Both sides send 'Finished' message
encrypted with session key
• - Secure communication begins
• → Completes handshake and starts encrypted
data exchange.
SSL Handshake Diagram
• Client Server
• | ----------- ClientHello ----------> |
• | <---------- ServerHello ----------- |
• | <-------- Server Certificate ------ |
• | <------- ServerKeyExchange -------- |
• | <------- CertificateRequest ------- | (optional)
• | <------------- HelloDone ---------- |
• | ------- Client Certificate -------> | (optional)
• | ---- Pre-Master Secret (encrypted)->|
Conclusion
• The SSL Handshake ensures:
• - Secure connection setup
• - Authentication of server (and optionally
client)
• - Confidentiality and integrity through
encryption
• → Essential for secure online communication.

You might also like