Solved

SHA-2 and TLS 1.2

Posted on 2014-03-20
1
2,646 Views
Last Modified: 2014-03-20
I assume TLS 1.2 is a protocol for crytography, and SHA-2 is an advaced encryption algorithm.

Given that is SHA-2 a  required component of TLS 1.2

Is SHA-2 a component of any other  protocols (rx: TLS 1.0, 1.1)

Is there a difference between SHA-2 and SHA-256 ?  (I am think there is no difference, just want to check)

Thanks in advance
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39942907
TLS (Transport Layer Security) is the successor to SSL and is used to encrypt transmissions over the network and the web.  http://en.wikipedia.org/wiki/Transport_Layer_Security

SHA is Secure Hash Algorithm http://en.wikipedia.org/wiki/Secure_Hash_Algorithm .  SHA-256 is a part of SHA-2.

A HASH is a one-way algorithm and not a two way-encryption method.  SHA-256 is used in TLS 1.2 to create a 'random number', not to do the encryption.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2
1

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question