Sena STS Series User Manual page 52

Secure terminal server
Table of Contents

Advertisement

symmetric key encryption. Symmetric key encryption is much faster than public-key encryption, but
public-key encryption provides better authentication techniques. The handshake allows the server to
authenticate itself to the client using public-key techniques, and then allows the client and the server to
cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper
detection during the session that follows. The details of handshake process step involved can be
summarized as follows:
1. The client sends the server the client's SSL/TLS version number, cipher settings, randomly
generated data, and other information the server needs to communicate with the client using
SSL/TLS.
2. The server sends the client the server's SSL/TLS version number, cipher settings, randomly
generated data, and other information the client needs to communicate with the server over
SSL/TLS. The server also sends its own certificate and, if the client is requesting a server
resource that requires client authentication, requests the client's certificate.
3. The client uses some of the information sent by the server to authenticate the server. If the
server cannot be authenticated, the user is warned of the problem and informed that an
encrypted and authenticated connection cannot be established. If the server can be
successfully authenticated, the client goes on to next step.
4. Using all data generated in the handshake so far, the client (with the cooperation of the server,
depending on the cipher being used) creates the premaster secret for the session, encrypts it
with the server's public-key (obtained from the server's certificate, sent in step 2), and sends
the encrypted premaster secret to the server. SSL/TLS differ in the way this "shared" master
secret is created
5. If the server has requested client authentication (an optional step in the handshake), the client
also signs another piece of data that is unique to this handshake and known by both the client
and server. In this case the client sends both the signed data and the client's own certificate to
the server along with the encrypted premaster secret.
6. If the server has requested client authentication, the server attempts to authenticate the client.
If the client cannot be authenticated, the session is terminated. if the client can be successfully
authenticated, the server uses its private key to decrypt the premaster secret, then performs a
series of steps (which the client also performs, starting from the same premaster secret) to
generate the master secret.
7. Both the client and the server use the master secret to generate the session keys, which are
symmetric keys used to encrypt and decrypt information exchanged during the SSL/TLS
session and to verify its integrity--that is, to detect any changes in the data between the time it
was sent and the time it is received over the SSL/TLS connection.
8. The client sends a message to the server informing it that future messages from the client will
be encrypted with the session key. It then sends a separate (encrypted) message indicating
52

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sts800Sts1600

Table of Contents