DH of SSL handshake protocol packet capture

a key exchange algorithm
The commonly used key exchange algorithms are RSA and DH. This article combines the theory with practice to introduce the packet capture process of DH in the SSL handshake protocol.
 
DH key exchange diagram in the SSL handshake protocol

 
Three-DH key exchange packet capture analysis
The first stage of the SSL handshake:
1、Client Hello (C->S)
2、Server Hello (S->C)
The second stage of the SSL handshake:
3、Certficate (S->C)

4、Server Key Exchange (S->C)

5、Server Hello Done (S->C)

The third stage of the SSL handshake:
6、Client Key Exchange (C->S)  

7、Change Cipher spec (C->S)  

8、Encrypted Handshake Message (C->S)  
The fourth stage of the SSL handshake:
9、 Change Cipher spec (S->C)

10、 Encrypted Handshake Message (S->C)

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326365024&siteId=291194637