
However, this encryption and decryption efficiency is low, and then derived from the hybrid encryption, which is a combination of asymmetric encryption and symmetric encryption. One party uses the public key of the other party for encryption, transmits the ciphertext to the other party, and the other party uses the private key to decrypt the ciphertext. The logic of this encryption mode is that the public key is used for encryption and the private key is used for decryption. Once one of the keys is leaked, it will lead to the decryption of the encrypted fileĪsymmetric encryption was invented later.

This encryption and decryption key is the same, so it is extremely insecure. In ancient times, symmetric encryption was used. Therefore, a series of necessary information for key generation can be obtained before key decryption data can be generated.īefore you worry about how to solve this problem, first of all, let's review a few knowledge points, generally understand the encryption algorithm and CA digital certificate and TLS encryption process: A few essential points ? Encryption algorithm ? TLS uses the encryption algorithm of symmetric key generated by Diffie - Hermann key exchange.

Then enter TLS to filter the request, and the suspected IP address is the target websiteĮnter the IP address, verify that it is the destination website httpbin, and then try to view the returned data information, because the RETURNED JSON data is not visible with TLS encryption Wireshark cannot be used to decrypt information encrypted at the TLS layer. Wireshark cannot be used to decrypt information encrypted at the TLS layer without the target private key. Too lazy to see the full text of the TLS process directly to the bottom of the picture explanationĬurl and Wireshark will be installed using curl and Wireshark. This article attempts to capture TLS packets using Wireshark and takes a look at the process of HTTPS requests and responses.

The whole process of TCP connection and disconnection is described in detail. In the previous article, WIREshark was used to debug HTTP requests and responses.
