Linked Questions

38 votes
3 answers
13k views

Let’s say I have never connected to the site example.com. If this site is https and I write https://example.com/supersecretpage will the URL be sent in clear text since it's the first time I connect ...
user104545's user avatar
29 votes
1 answer
33k views

In the TCP SSL sever handshake, does the server also send CA certificates? Does the server need to send all intermediate CA certificates in the Server Hello?
Rahul_cs12's user avatar
20 votes
5 answers
7k views

If one has a phishing website that uses the original certificate that was obtained by accessing that website, can an attack fool users to believe they are accessing legitimate websites? If not, how ...
Kevin JJ's user avatar
  • 317
14 votes
2 answers
7k views

SSL uses both asymmetric cryptography and symmetric cryptography. Why can't it, or why doesn't it, just use one of them?
Wika's user avatar
  • 165
17 votes
1 answer
23k views

In SSL, the client generates a pre-master key from random data from itself and also the server. It then encrypts this with the server's public key, sends it to the server and then both client and ...
Michael Deardeuff's user avatar
6 votes
2 answers
4k views

My IE browser has SSLv3.0, TLS 1.0,1.1 and 1.2 enabled in the advanced settings. And (I was informed by my server admin) my web server can encrypt data in SSLv3.0 and TLS 1.0 Now which system (...
nJoshi's user avatar
  • 171
11 votes
3 answers
18k views

I'm using the self-signed certificate, but I don't know how this protocol works. I connect two apps with a socket SSL and it works fine. The server is a Python app and the client is an Android app. I ...
juve164's user avatar
  • 111
-1 votes
2 answers
43k views

I want to use the SSL protocol. SSL protocol uses port 443. During the initial handshake does the communication occur on port 80 or does the handshake start on port 443? If not during the initial ...
ssk's user avatar
  • 79
3 votes
2 answers
19k views

I have read that a session key is symmetric, and it is encrypted by recipient's public key; When "Bob" receives a message, does he decrypt it with his private key and he's then in possession of an ...
Vũ Đức Lộc's user avatar
5 votes
3 answers
8k views

I'm learning how the Certificate Authority work and have a question. As my understanding, the Certificate Authority can guarantee that the client get the true public-key: Saying that I'm a server and ...
Yves's user avatar
  • 361
5 votes
1 answer
10k views

When a client accesses an HTTPS webpage, (please correct me if I'm wrong), it just checks whether the certificate of that website has been signed by a trusted CA or not, but does not ask directly the ...
Franzech Domâs's user avatar
3 votes
3 answers
3k views

If I sent a username and the password to a website over HTTPS, is it possible that someone on the net would save this request and re-send it later to authenticate on the website?
Tony's user avatar
  • 141
3 votes
2 answers
13k views

As I understand the original master key, which is used to encrypt the application data is never transmitted over the wire and it is calculated on both client and server individually using a hashing-...
Hemanth's user avatar
  • 131
8 votes
2 answers
940 views

I recently read about how HTTPS work and I have some questions to clarify. Pardon me if this sounds silly but I just need to get this clear. Correct me if I am wrong. I got to know that as part of ...
shazin's user avatar
  • 189
6 votes
2 answers
3k views

If I understand right, there is a "handshake" where both the server and the browser verify who they are and agree on an encryption key. Why cannot a hacker just watch the network for the keys going ...
Anonymous Penguin's user avatar

15 30 50 per page
1
2 3 4 5
22