S
S
Sergey Shilovsky2019-04-16 11:57:00
Computer networks
Sergey Shilovsky, 2019-04-16 11:57:00

How does https encrypt the response from the server before generating the symmetric key?

How the data is encrypted when sent to the server seems to be clear:
the Server, through an open channel, sends the browser a certificate containing a public key, with which the browser encrypts data before sending it to the server.
And how is the encryption going in the opposite direction?
I know that a symmetric key is created next, but it turns out that either the browser generates it and gives it to the server as a given, or another pair of keys is needed for communication.
It is also of interest: each certificate, if viewed in Windows, has a "valid until", is this the date when the browser must check whether this certificate is still valid or the date the server must update the certificate with a key pair change?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
P
pfg21, 2019-04-16
@First_Spectr

the browser encrypts the data with the public key - the result is encrypted data that can only be decrypted with the private key.
those. it turns out the same thing, only the public and private keys are reversed
ps .: data encrypted with a public key cannot be decrypted using a public key.
after this date, the certificate is considered invalid and inoperative.
In the same place in Windows there is a separate section for expired keys.

V
Vladimir Dubrovin, 2019-04-16
@z3apa3a

The symmetric key is generated using the Diffie-Hellman protocol .
The date of validity of the certificate determines the validity of the certificate, if the certificate is presented before the start of the validity or after the end - it is not considered valid.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question