

The change cipher spec message, transmitted by both the client and the server, defines the re-negotiated cipher spec and keys that will be used for all the messages exchanged henceforth.

Applying the Message Authentication Code (MAC), a hash to maintain the data integrity.Compressing/decompressing the outgoing/incoming data.

Fragmenting the message to be transmitted into manageable blocks.TCP Record Protocol Layer – This is the lower layer which lies on top of the TCP layer and is responsible for:.It is designed to work on top of a reliable transport protocol such as TCP (but has been adapted to UDP, as well) and is divided into two sub-layers: TLS lies in between the application and the transport layer.
