How TLS Protects Your Web Activity

Image source: https://securedcommunications.com/download--secured-communications.html

What is TLS?

How Does TLS Work

  1. A symmetric encryption algorithm (such as AES)
  2. An asymmetric encryption algorithm (such as RSA)
  3. A Message Authentication Code (MAC), used to authenticate messages
  1. Along with the public key, the server sends a message encrypted with the private key to prove that the two keys are indeed pairs. The message contains a string known as the DH parameter.
  2. Instead of the client generating the pre-master secret randomly, both the server and client use the DH parameter to generate it.

Summary

SafeHouse

--

--

Freedom through decentralization

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store