Back method14.shtml Next


Public-Key Encryption Algorithms : SSL


SSL Application Data Protocol

When any communcation between the client and server is necessary, the established secret key is used, and the integrity of the message is verified with the previously specified hash function.






Copyright 1997 by Slackers Union. Comments should go to any of the group members. Opinions reflected on this page are by no means opinions of UCSD. Go sue somebody else.

Last Modified: June 1, 1997