S1: Client connects to the Server and the server sends its public key to the client.
S2: Client and Server will negotiate security transforms between them. This negotiation does not occur in an encrypted format.
S3: Then Client encrypts session key by using the public key of the server.
S4: Once Client encrypts session key it sends this encrypted session key back to the Server. The server decrypts the encrypted session key using its own private key.
S5: From this point of time, all the data between client and server is encrypted.
Md.Kareemoddin
CCIE # 54759
0 Comments