
The SSL Handshake
Appendix K
Introduction to SSL
805
The SSL Handshake
The SSL protocol uses a combination of public-key and symmetric key encryption.
Symmetric key encryption is much faster than public-key encryption, but public-key
encryption provides better authentication techniques. An SSL session always begins with an
exchange of messages called the
SSL handshake
. The handshake allows the server to
Table K-2
Cipher Suites Supported by
Red Hat
When Using Fortezza for SSL 3.0
Strength Category and
Recommended Use
Cipher Suites
Strong Fortezza Cipher Suites
Permitted for deployments within
the United States only. These
cipher suites support encryption
that is strong enough for most
business or government needs.
Red Hat
Console does not support
these cipher suites.
RC4 With 128-bit Encryption and SHA-1 Message Authentication
Like RC4 with 128-bit encryption and MD5 message authentication, this
cipher is one of the second strongest ciphers after Triple DES. It permits
approximately 3.4 * 10
38
possible keys, making it very difficult to crack.
This cipher suite is supported by SSL 3.0 but not by SSL 2.0.
RC4 With SKIPJACK 80-Bit Encryption and SHA-1 Message
Authentication
The SKIPJACK cipher is a classified symmetric-key cryptographic algorithm
implemented in Fortezza-compliant hardware. Some SKIPJACK
implementations support key escrow using the Law Enforcement Access Field
(LEAF). The most recent implementations do not.
This cipher suite is supported by SSL 3.0 but not by SSL 2.0.
Weakest Fortezza Cipher Suite
This cipher suite provides
authentication and tamper detection
but no encryption. Server
administrators must be careful
about enabling it, however, because
data sent using this cipher suite is
not encrypted and may be accessed
by eavesdroppers.
Red Hat
Console does not these
cipher suites.
No Encryption, SHA-1 Message Authentication Only
This cipher uses SHA-1 message authentication to detect tampering.
This cipher suite is supported by SSL 3.0 but not by SSL 2.0.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...