-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

TLS Cryptography In-Depth
By :

In this chapter, we took a detailed look at the TLS specification and the various secrets and keys it defines. Specifically, we have seen how different keys used for different contexts are derived from initial secrets – either PSKs or a secret coming from a Diffie-Hellman key exchange.
We have also tried to highlight various best practices in cryptography engineering deployed within TLS: different keys for different purposes, well-defined fallback and alert procedures in case of protocol errors, and the destruction of obsolete keying material.
In the next chapter, we will take a step back and see how the cryptographic primitives we discussed in the previous chapters fit together to form the TLS Handshake protocol.
Change the font size
Change margin width
Change background colour