verified using a MAC (message authen6ca6on code) • Secret key + message => MAC Algorithm => MAC code • MAC code sent with every message • Receiver runs the message through the MAC algorithm to check the MAC code matches
secure • the nego+ated secret is unavailable to eavesdroppers • The nego+a+on is reliable • The par+es will know if an a:acker tries to modify the nego+a+on
sends it to the server 4) Each side generates master secret using the secret key and random values sent in prior messages 5) Provide security parameters to the record layer