Question

A server often wants to authenticate a client. The SSL/TLS handshake protocol includes the possibility to authenticate the cl

0 0
Add a comment Improve this question Transcribed image text
Answer #1

For a better understanding, one should first understand The Basic phases of SSL/TLS.
Steps used in SSL:

1.Establish Security Capabilities - used by
the client to initiate a connection and to
establish security capabilities.

2.Server Authentication and Key Exchange -
The server sends its
certificate if it needs to be authenticated.

3.Client Authentication and Key
Exchange - the client verifies that the
the server provided a valid certificate and check that the server's hello
parameters are acceptable.

4. Finish - this phase completes the
setting up a secure connection.

So, For most of the large web pages(Websites with a very large number of visitors) performance matters a lot.

SSL Handshake Protocol performance is not considered to be that high if we talk about web pages since the information that client send has to be encrypted by the server, it takes more server resources than if the information weren’t encrypted.

So, the Cost of performing above four steps of SSL/TSL Handshake for web pages especially for large web pages are comparably high. So, Handshake Protocol is typically not used on the internet when requesting SSL protected web pages.

Add a comment
Know the answer?
Add Answer to:
A server often wants to authenticate a client. The SSL/TLS handshake protocol includes the possibility to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • During TLS handshake, the client hello and the server hello messages are not encrypted or authenticated....

    During TLS handshake, the client hello and the server hello messages are not encrypted or authenticated. Explain why a man-in-the-middle cannot exploit these messages. Answer for both Diffie-Hellman and RSA case.?

  • Project Description In this project, you will be developing a multithreaded Web server and a simple...

    Project Description In this project, you will be developing a multithreaded Web server and a simple web client. The Web server and Web client communicate using a text-based protocol called HTTP (Hypertext Transfer Protocol). Requirements for the Web server The server is able to handle multiple requests concurrently. This means the implementation is multithreaded. In the main thread, the server listens to a specified port, e.g., 8080. Upon receiving an HTTP request, the server sets up a TCP connection to...

  • Client #1 IP 160.16.0.3 MAC 00:01:02:03:04:22 Client #2 IP 160.16.0.11 Client #3 Web Server MAC 00:01:02:03:04:06...

    Client #1 IP 160.16.0.3 MAC 00:01:02:03:04:22 Client #2 IP 160.16.0.11 Client #3 Web Server MAC 00:01:02:03:04:06 IP 160.16.0.10 IP 160.16.0.70 MAC 00:01:02:03:04:07 Interface Fa0/0 Interface Fao MAC 00:01:02:03:04:33 IP 160.16.0.1 IP 160.16.0.65 MAC 00:01:02:03:04:A1 MAC 00:01:02:03:04:11 1000000000 IP Router Ethernet Ethernet Ethernet Hub Hub Switch Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1 to #5. For each device, both its Internet Protocol (IP) address and its MAC address (also called...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set...

    Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure the RMC network and ensure that the...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT