10. Network security: tunnelling and TLS Flashcards

1
Q

What algorithms can be used for establishing an encryption key?

A
  • RSA
  • Diffie-Hellman

(Asymmetric algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the (simplified steps) for TLS? (6)

A
  • Client sends supported cryptos
  • Server picks strongest supported
  • Server sends certificate
  • Client verifies certificate
  • Key exchange (asymmetric)
  • Data transfer (symmetric)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly