1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 Figure 5-90: SSL Protocol

1 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 246
Download on canonical page 246 pages, 2.94 Mb
The SSL architecture differentiates between an SSL session and an SSL connection. A connection is a
transient transport device between peers.
A session is an association between a client and a server. Sessions define a set of cryptographic security
parameters, which can be shared among multiple connections. Sessions are used to avoid the expensive
negotiation of security parameters for each new connection. A session is identified with a session identifier,
peer certificate, compression method, cipher spec, master secret, and is_resumable flag. A connection is
identified with a server and client random numbers, a server write MAC secret key, a client write MAC secret
key, a server write key, a client write key, initialization vectors, and sequence numbers.

5.12.1.2.1 SSL handshake protocol

The SSL handshake protocol is responsible for performing authentication of peers that are attempting secure
communications. The SSL handshake protocol negotiates security parameters (encryption and hash
algorithms) to be used by the SSL record protocol, and exchanges PreMasterSecret, which is used to generate
authentication and encryption keys.
The handshake protocol is the most complex part of SSL. It starts with mandatory authentication of the
server. Client authentication is optional. After successful authentication, the negotiation for the cipher suite,
with the encryption algorithm, MAC algorithm, and cryptographic keys, takes place. Security parameters, set
up by the handshake protocol, are used for all connections in a session. The following diagram illustrates the
handshake protocol.
186
Figure 5-90: SSL Protocol
MENU

Models

Contents