Question: 1 5 . Let's take a look at what a real public key looks like! What are the first four hexadecimal digits of the modulus
Let's take a look at what a real public key looks like! What are the first four hexadecimal digits of the modulus of the public key being used by wwwcics.umass.edu? Enter the four hexadecimal digits without spaces between the hex digits and without any leading x using lowercase letters where needed, and including any leading s after x Hint: this information can be found in subjectPublickeyInfo subfield of the SignedCertificate field of the certificate for wwwcsumass.edu. Look in your trace to find messages between the client and a CA to get the CA s public key information, so that the client can verify that the CAsigned certificate sent by the server is indeed valid and has not been forged or altered. Do you see such message in your trace? If so what is the number in the trace of the first packet sent from your client to the CA If not, explain why the client did not contact the CA The Server Hello message is always terminated by an explicit Server Hello Done record. What is the packet number in your trace for the TLS message part that contains the Server Hello Done TLS record? The TLS Handshake: wrapping up the handshake After the exchange of Hello messages, the client responds to the TLS Server Hello message with its own public key information, a declaration via a Change Cipher Spec record that all further communication will be encrypted via the negotiated algorithm and key, and an Encrypted Handshake Message record that contains encrypted information eg a cryptographic hash of all messages exchanged during this handshake to prevent maninthemiddle replay attacks. What is the packet number in your trace for the TLS message that contains the public key information, Change Cipher Spec, and Encrypted Handshake message, being sent from client to server? Does the client provide its own CAsigned public key certificate back to the server? If so what is the packet number in your trace containing your client's certificate? Lastly, the server responds to the client with its own a declaration via a Change Cipher Spec record that all further communication will be encrypted via the negotiated algorithm and key, and an Encrypted Handshake Message record which also contains encrypted information eg a cryptographic hash of all messages exchanged during this handshake to prevent maninthemiddle replay attacks.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
