It uses an asymmetric public key infrastructure for securing a conversation connection. There are two distinctive types of keys utilized for encryption - The consumer and server experience a great deal of forwards and backwards (termed a TLS/SSL handshake) right until they set up a safe session.- The handshake begins Using the customer sending a C