Establishing SSL-secured Communications
Step D
- Server verifies validity of client’s certificate
- Server receives session key, decrypts it using client’s public key, and modifies server’s encryption to match that requested by client
- Server indicates end of normal transmissions
Step E
- Secure, encrypted communication begins between client and server