During a web penetration test you capture full packets from an HTTPS session that was negotiated with TLS 1.2. Two days later you obtain the target server's private RSA key from an old backup and want to decrypt the recorded traffic offline. Under which circumstance will this attempt actually succeed?
The handshake used a static RSA key exchange without any ephemeral Diffie-Hellman parameters.
The server's certificate chain included an intermediate signed with SHA-1.
The negotiated cipher employed AES-256-GCM for bulk encryption.
The handshake used ECDHE key exchange providing perfect forward secrecy.
In a TLS 1.2 handshake that uses a static RSA key exchange, the client generates the premaster secret and encrypts it with the server's long-term public RSA key contained in the certificate. Anyone who later obtains the matching private key can decrypt that premaster secret from the captured ClientKeyExchange message, derive the master secret, and reconstruct the symmetric session keys-making full decryption of the recorded data possible. When the handshake uses ephemeral Diffie-Hellman (DHE or ECDHE), each session establishes a one-time key that is never encrypted with the server's long-term key, providing perfect forward secrecy (PFS) and preventing retrospective decryption. Certificate hash algorithms such as SHA-1 and the choice of bulk cipher (e.g., AES-256-GCM) do not affect whether the historic traffic can be decrypted once the private key is exposed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between static RSA key exchange and ephemeral Diffie-Hellman (DHE/ECDHE) in TLS?
Open an interactive chat with Bash
What is perfect forward secrecy (PFS) and why is it important?
Open an interactive chat with Bash
How does the choice of hash algorithm or bulk cipher affect TLS security?
Open an interactive chat with Bash
Why does static RSA key exchange allow retrospective decryption?
Open an interactive chat with Bash
What is Perfect Forward Secrecy (PFS)?
Open an interactive chat with Bash
How does AES-256-GCM affect encryption in TLS?
Open an interactive chat with Bash
Certified Ethical Hacker (CEH)
Cryptography
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .