Encrypting the handshake

Encryption using both keys protects the exchange of the identity-verifying certificates.

Figure 16. The handshake uses asymmetric keys to encrypt the exchange of certificates


The handshake uses asymmetric keys to encrypt the exchange of certificates

The private key on the server side encrypts the opening handshake, and the client’s matching public key decrypts it. This action (called asymmetric cryptography) protects the exchange of certificates used to establish identity.