7.10 Public-key cryptography in TLS 1.3
Equipped with the mathematical background on public-key cryptography, we can now explore how it is applied in TLS 1.3.
In the previous chapter, we learned that client Bob and server Alice exchange messages during the TLS handshake phase to establish all parameters necessary for deriving the TLS secrets and, subsequently, the TLS keys.
Technically, these cryptographic parameters are transmitted in the key˙share
extension of the ClientHello
, ServerHello
and, if needed, HelloRetryRequest
messages.