Solved

Whats the use of master secret

Posted on 2016-09-20
4
98 Views
Last Modified: 2016-10-06
Hi,
In SSL handshake a master secret is generated. I guess this secret is the same for both client and server.
where exactly is this used. Is it used to encrypt or decrypt data ?
client and server already exchange a cipher suite how is the cipher suite related to this master secret

Thanks
0
Comment
Question by:Rohit Bajaj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 29

Expert Comment

by:Pawan Kumar
ID: 41806428
Its main purpose is to keep data confidential. & data integrity - if someone or something, willingly or not, alters data in transit, then the receiver must be able to reliably detect it.
0
 

Author Comment

by:Rohit Bajaj
ID: 41806485
So when client sends some packet to server it encrypts the packet with master secret and same way server also encrypts with this same master secret and send the packet to client ?
Then where does the encryption that is sent in cypher suite comes into play ?
0
 
LVL 29

Accepted Solution

by:
Pawan Kumar earned 500 total points
ID: 41806807
Read # number 5,7,8 &9. This should help.

1. The client sends a "Client hello" message to the server, along with the client's random value and supported cipher suites.

2. The server responds by sending a "Server hello" message to the client, along with the server's random value.

3. The server sends its certificate to the client for authentication and may request a certificate from the client. The server sends the "Server hello done" message.

4. If the server has requested a certificate from the client, the client sends it.

5. The client creates a random Pre-Master Secret and encrypts it with the public key from the server's certificate, sending the encrypted Pre-Master Secret to the server.

6. The server receives the Pre-Master Secret. The server and client each generate the Master Secret and session keys based on the Pre-Master Secret.

7. The client sends "Change cipher spec" notification to server to indicate that the client will start using the new session keys for hashing and encrypting messages. Client also sends "Client finished" message.

8. Server receives "Change cipher spec" and switches its record layer security state to symmetric encryption using the session keys. Server sends "Server finished" message to the client.

9. Client and server can now exchange application data over the secured channel they have established. All messages sent from client to server and from server to client are encrypted using session key.
0
 

Author Comment

by:Rohit Bajaj
ID: 41817549
Hi,
I still have some confusion. I understand that master secret is computed from pre-master secret and random values.
But as you mentioned that all messages from client to server and server to client are encrypted using session keys...

1) Both sides have same session keys ?
2) where is the master secret used here..... is it used to decrypt the messages whereas session keys are used to encrypt the messages ?
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question