Book Image

Packet Analysis with Wireshark

By : ANISH NATH
Book Image

Packet Analysis with Wireshark

By: ANISH NATH

Overview of this book

Table of Contents (14 chapters)

Key exchange


In the next section, we will talk about how the SSL/TLS channel can be decrypted; before that, we need to understand what the different keys exchange methods are and what their cipher suites look like. These are the following key exchange methods.

The Diffie-Hellman key exchange

This protocol allows two users to exchange a secret key over an insecure medium without any prior secrets; in this scheme, the example cipher suites will have a naming convention such as:

  • SSL_DH_RSA_WITH_DES_CBC_SHA

  • SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA

Cipher suites will have "DH" in their name, not "DHE" or "DH_anon".

Note

You can learn more about Diffie-Hellman at: https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange.

Elliptic curve Diffie-Hellman key exchange

Elliptic curve Diffie-Hellman is a modified Diffie-Hellman exchange that uses elliptic curve cryptography instead of the traditional RSA-style large primes. Elliptic curve cryptography (ECC) is a public-key cryptosystem just like RSA, Rabin, and El...