Solved

SHA-2 and TLS 1.2

Posted on 2014-03-20
1
2,515 Views
Last Modified: 2014-03-20
I assume TLS 1.2 is a protocol for crytography, and SHA-2 is an advaced encryption algorithm.

Given that is SHA-2 a  required component of TLS 1.2

Is SHA-2 a component of any other  protocols (rx: TLS 1.0, 1.1)

Is there a difference between SHA-2 and SHA-256 ?  (I am think there is no difference, just want to check)

Thanks in advance
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39942907
TLS (Transport Layer Security) is the successor to SSL and is used to encrypt transmissions over the network and the web.  http://en.wikipedia.org/wiki/Transport_Layer_Security

SHA is Secure Hash Algorithm http://en.wikipedia.org/wiki/Secure_Hash_Algorithm .  SHA-256 is a part of SHA-2.

A HASH is a one-way algorithm and not a two way-encryption method.  SHA-256 is used in TLS 1.2 to create a 'random number', not to do the encryption.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2
1

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The related questions "How do I recover the passwords for my Q-See DVR" and "How can I reset my Q-See DVR to eliminate a password" are seen several times a week.  Here we discuss the grim reality of the situation.
Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question