Академический Документы
Профессиональный Документы
Культура Документы
Fig 6.9
L5 data
L5 data
SH
L5 data
L3 data
L5 data
SSL
L5 data
Transport
H4
L4 data
Application
L5 data
Internet
H3
H2
L3 data
H3
H2
010101010100010101010010
Transmission medium
Fig 6.10
H4
L4 data
Data Link
010101010100010101010010 Physical
SH
SSL Sub-Protocols
Handshake Protocol
Record Protocol
Alert Protocol
Type
Length
1 byte 3 bytes
Content
1 or more bytes
Fig 6.11
Parameters
Hello request
None
Client hello
Certificate
Parameters, signature
Certificate request
Type, authorities
None
Certificate verify
Signature
Parameters, signature
Finished
Hash value
Server hello
Fig 6.12
1.
2.
3.
Finish
Fig 6.13
Web
Server
Web
Browser
Fig 6.14
Web
Server
Fig 6.15
Web
Server
Web
Server
Fig 6.16
2. Finished
Step 4: Finished
Fig 6.17
Web
Server
Fragmentation
Compression
Addition of MAC
Encryption
Append header
Fig 6.20
Fig 6.24
SSL
SET
Main aim
Certification
Authentication
Strong
mechanisms
for
authenticating all the parties
involved
Unlikely, since customer gives
financial data to payment
gateway
Customer has to digitally sign
payment instructions
Merchant is liable
Practical usage
High
Fig 6.40