In this illustration we see Bob on the left looking rightward and Alice on the right looking leftward. A dotted arrow extends vertically from each, representing the passage of time. A blue arrow labeled "TCP SYN" extends diagonally downward to the right from Bob's timeline to Alice's timeline. Her response, labeled "TCP/SYNACK," extends diagonally downward to the right to Bob's timeline. This transaction is labeled "(a)," corresponding to the steps given in the text on page 635. Bob's response, labeled "TCP ACK," extends from Bob to Alice.

Below this point on Bob's timeline a new blue arrow, labeled "SSL hello," extends diagonally downward from Bob to Alice. Her response, labeled "certificate," extends from Alice to Bob. This transaction is labeled "(b)." There is a small gap on Bob's timeline, labeled "(c), Create Master Secret (MS)," followed by a blue arrow labeled "EMS = K A+ (MS)" that extends from Bob to Alice. This point on Alice's timeline is labeled "Decrypts EMS with KA- to get MS."