From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 23,500 courses taught by industry experts.

The SSL and TSL handshake process

The SSL and TSL handshake process

From the course: Ethical Hacking: Cryptography

The SSL and TSL handshake process

- [Narrator] It's time to go behind the scenes and explain various implementations of PKI that you don't quite see, yet you make use of them every day. Let's look at the handshake process known as SSL/TLS. In fact, it's time to pause for a brief history lesson. SSL is an insecure predecessor of the latest version of TLS, which is now at 1.3. Although you may still see references to SSL, Google discovered major vulnerabilities around 2014, and as with everything else, it's been improved. This will be important if you see any exam answer choices that suggest not upgrading legacy systems that are still running SSL, or other insecure protocols, and you'll know right away this isn't a recommended path expected from your cybersecurity expert role. Now, let's look at the TLS handshake process. We have a client and a server needing to exchange secure information. Perhaps you need to search up information on Google from your computer. We know that each have their own public and private key…

Contents