1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
14

What steps are involved in the ssl record protocol transmission?

Computers and Technology
1 answer:
HACTEHA [7]3 years ago
4 0
Below are the steps involved:

1. Fragmentation:<span> Every upper layer message  is fragmented into 2^14 equivalent to </span>16384 bytes or less blocks.
2. Compression: This one is optionally applied and must be lossless. It may not increase content length by more than 1024 bytes.
3. Compute a MAC (Message Authentication Code): For this purpose, a shared secret key has to be used.
4. Encryption: Inclusive of the MAC, the compressed message is encrypted using symmetric encryption. It must not increase the length by 1024 bytes or more.
5. Preparing a heading in the following fields: Major Version (8 bits); Compression Length (16 bits); Minor Version (8 bits); and Content Type (8 bits).








You might be interested in
Group of programs are software ​
Cloud [144]

Answer:

No

Explanation:

a single program or application is a software

3 0
3 years ago
Read 2 more answers
What is the meaning of ethics? Check all of the boxes that apply
suter [353]

Answer:

behavior that is good for everyone

following the rules

behaving in a way that would be easy to defend

Explanation:

6 0
3 years ago
Fuel-pressure regulators on fuel-return-type fuel-injection systems are installed
Natalija [7]
1) The correct answer is <span>B. at the end of the fuel rail.
2) The one who is correct is the Technician A.</span>
5 0
3 years ago
Read 2 more answers
Which of the following uses replication to Infect multiple computers?
Nikolay [14]

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

3 0
3 years ago
Read 2 more answers
HELPPPPPPPP
Reika [66]
The answer is visual hierarchy :)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • I just started game development using unity, I’m trying to control my sphere moving on a flat surface using the W,A,S,D keys, if
    11·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans.Mary is al
    15·1 answer
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • You can rotate a selected graphic by dragging a ________ rotation handle
    13·1 answer
  • Among the second generation home console companies,which managed to come out on top
    10·1 answer
  • Priortization is an example of a skill that helps you reach long term goals because
    14·1 answer
  • What is one way a pivottable could combine the following data?
    8·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!