Solved

SHA-2 and TLS 1.2

Posted on 2014-03-20
1
2,811 Views
Last Modified: 2014-03-20
I assume TLS 1.2 is a protocol for crytography, and SHA-2 is an advaced encryption algorithm.

Given that is SHA-2 a  required component of TLS 1.2

Is SHA-2 a component of any other  protocols (rx: TLS 1.0, 1.1)

Is there a difference between SHA-2 and SHA-256 ?  (I am think there is no difference, just want to check)

Thanks in advance
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39942907
TLS (Transport Layer Security) is the successor to SSL and is used to encrypt transmissions over the network and the web.  http://en.wikipedia.org/wiki/Transport_Layer_Security

SHA is Secure Hash Algorithm http://en.wikipedia.org/wiki/Secure_Hash_Algorithm .  SHA-256 is a part of SHA-2.

A HASH is a one-way algorithm and not a two way-encryption method.  SHA-256 is used in TLS 1.2 to create a 'random number', not to do the encryption.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2
1

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question