22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

252 Lotus Security Handbook<br />

Once the authentication has taken place, the process of negotiating the SSL<br />

session key can take place. This process is illustrated in Figure 6-22.<br />

Figure 6-22 Negotiating the SSL Session key<br />

In this phase of the handshake, the partners establish the session key, which is<br />

used to encrypt and decrypt all transmissions for that session. As with the<br />

authentication process, the SSL session key negotiation is also transparent for<br />

the user. This is what occurs in this phase:<br />

1. The client sends a “ClientHello” message to the server with a list of possible<br />

ciphers (or encryption algorithms) to be used for encryption.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!