![]() TLS protocol describes the steps to authenticate the peers and set up a secure connection with defined parameters. Handshake: To communicate over a secure channel, two peers must agree on the cryptographic keys and encryption algorithms for that session.Application Data: This protocol ensures that messages are fragmented, compressed, encrypted and transmitted in a secure manner.The change cipher spec message, transmitted by both the client and the server, defines the re-negotiated cipher spec and keys that will be used for all the messages exchanged henceforth. Change Cipher Spec: It defines changes in ciphering strategies.It is used to notify the peer of any error condition that has occurred. Alert: This sub-protocol defines the alert levels and provides a description of the alerts. ![]() The higher layer consists of the following sub-protocols:. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |