Page 54 - CITS - Computer Software Application -TT
P. 54

COMPUTER SOFTWARE APPLICATION - CITS


























           Phase 1: During this initial phase, both the client and the server send “hello” packets to each other. These packets
           contain essential information such as the IP session details, chosen cipher suite, and protocol version. This
           exchange is crucial for setting up the foundation of security.

           Phase 2: In the second phase, the server takes the lead by transmitting its certificate and its key exchange
           information. The server’s role in this phase concludes with the dispatch of a “Server-hello-end” packet, marking
           the end of its contribution.

           Phase 3: The third phase involves the client’s response to the server. The client forwards its certificate and key
           exchange details to the server during this stage.
           Phase 4: The final phase encompasses the execution of the “Change Cipher Suite” procedure. This pivotal
           step signifies the transition to an encrypted communication state. Following this phase, the Handshake Protocol
           concludes, paving the way for secure data transmission.

           Change-cipher Protocol
           The Change Cipher Spec Protocol is closely integrated with the SSL record protocol and plays a crucial role in
           the SSL/TLS connection setup. Until the Handshake Protocol concludes, the SSL record output remains in a
           “pending” state. Once the Handshake Protocol is successfully completed, this “pending” state transitions into the
           “current” state.
           The Change Cipher Spec Protocol is simple in nature, consisting of a single message that is just one byte in
           length. This message can have only one possible value. The primary purpose of this protocol is to trigger the
           transfer of the data in the “pending” state to become the new “current” state.
           In essence, the Change Cipher Spec Protocol serves as a catalyst for moving the SSL/TLS connection from the
           negotiation phase (Handshake Protocol) to the encrypted data exchange phase (current state), ensuring that the
           encryption settings agreed upon during the handshake are applied to subsequent communication.
           Alert Protocol
           The Alert  Protocol  is  an  integral  part  of  the  SSL/TLS  protocol  suite,  designed  to  enhance  the  reliability  and
           communication between a client and a server.
           This protocol is responsible for transmitting alert messages between the two parties, conveying crucial information
           about the status and health of the SSL/TLS connection.

           Alert messages generated by the Alert Protocol can encompass a range of situations, including errors, warnings,
           or notifications. These messages play a vital role in ensuring that both parties are informed about any anomalies
           that might arise during the course of the communication.
           Alert messages serve various purposes, such as signaling issues related to the SSL/TLS connection’s security,
           such as certificate problems or unexpected closures. They also assist in diagnosing and troubleshooting any
           potential problems that might arise during the communication process.
           By employing the Alert Protocol, SSL/TLS connections become more robust and responsive, as both parties are
           promptly made aware of any potential issues that might impact the integrity, confidentiality, or authenticity of the
           exchanged data. This ultimately contributes to a safer and more secure communication environment.



                                                           41

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   49   50   51   52   53   54   55   56   57   58   59