User Guide
SSL HANDSHAKE
CHAPTER 10: DECRYPTION POLICIES 187
3. Authenticate the identity of each side. Typically, only the server gets authenticated while
the client remains unauthenticated. The client validates the server certificate. For more
information about certificates and using them to authenticate servers, see “Digital
Certificates” on page 188.
4. Generate temporary symmetric keys to encrypt the channel for this session. The client
generates a session key (usually a random number), encrypts it with the server’s public
key, and sends it to the server. The server decrypts the session key with its private key. Both
sides compute a common master secret key that will be used for all future encryption and
decryption until the connection closes.