10. Network security: tunnelling and TLS Flashcards
1
Q
What algorithms can be used for establishing an encryption key?
A
- RSA
- Diffie-Hellman
(Asymmetric algorithms)
2
Q
What are the (simplified steps) for TLS? (6)
A
- Client sends supported cryptos
- Server picks strongest supported
- Server sends certificate
- Client verifies certificate
- Key exchange (asymmetric)
- Data transfer (symmetric)