Data transmission after the handshake

Once server identity has been established using asymmetric cryptography, the transmission continues with a negotiated symmetric key that both encrypts the data (symmetric cryptography).

Figure 17. A single key speeds symmetric encryption/decryption


A single key speeds symmetric encryption/decryption