Solved

Ciphers and TLS 1.2

Posted on 2014-03-21
3
441 Views
Last Modified: 2014-03-21
TLS 1.2 requires SHA-2

Is there a list of ciphers that are required for TLS 1.2 ?
0
Comment
Question by:Anthony Lucia
  • 2
3 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39946220
On the page I keep referring you to is a list of the ciphers used by all the versions of SSL and TLS.  However, SHA is Not a cipher, it is a Hash, and it is only used in TLS to create a 'hash' of the message to check the validity of the data.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2

A cipher is two way encryption in that it can be used to both encrypt and decrypt a message.  A hash is a one-way function that is supposed to uniquely identify the data that was used to generate it.  MD5 and SHA are used, for example, to verify file downloads or transfers.  If you generate an MD5 or SHA hash of a file that you have downloaded, it should match the hash that was posted for that file.  The length of an MD5 or SHA hash is fixed and has nothing to do with the length of the file or the size of the data.  http://en.wikipedia.org/wiki/SHA-256
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39946255
Sorry, I did not mean to imply SHA was a cipher, and I now know the difference between them

Thanks for your answer
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39946716
You're welcome.  I've learned a lot of things by stumbling into them and having to figure them.  Glad to help.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

On Beyond Tools A conversation I recently had with the DevOps manager of a major online retailer really made me think about DevOps monitoring tools (https://www.onpage.com/devops-incident-management-tool/). The manager and I discussed how sever…
As technology users and professionals, we’re always learning. Our universal interest in advancing our knowledge of the trade is unmatched by most industries. It’s a curiosity that makes sense, given the climate of change. Within that, there lies a…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now