Other protocols, as HyperText Transport Protocol (HTTP), Lightweight Directory Access Protocol (LDAP), or Internet Messaging Access Protocol (IMAP), execute ' ' on ' ' of the TCP/IP in the direction of that all they use protocol TCP/IP for typical tasks of support of the application, such as exhibition of pages web or the execution of email servers. The SSL Handshake Protocol is composed for two phases: the authentication of the server and the authentication of customer (optional). In the first phase, the server, in reply to the order of a customer, sends its certificate and its preferences. The customer then generates a key master, who criptografa with the public key of the server, and transmits the key master criptografada for the server. The server recoups the key master and if he legalizes for the customer returning a notarized message with the key master.
The data later are criptografadas and notarized with keys derived from the key master. In the optional phase in according to place, the server sends one challenge for the customer. The customer if legalizes for the server, returning the digital signature from the customer on the challenge, as well as the respective one certifyd of public key. Protocol SSL is executed above of the TCP/IP and below of the superior level of other protocols, enters the layer of transport and the layer of applicatory, as HTTP or IMAP. It uses the TCP/IP on behalf of the protocols of superior level, and in the process he allows that a serving qualified SSL if legalizes for a qualified customer SSL, also allows that the customer if legalizes for the server and that both the machines establish a criptografada connection. It knows our Lodging of Site