Solved

Ciphers and TLS 1.2

Posted on 2014-03-21
3
442 Views
Last Modified: 2014-03-21
TLS 1.2 requires SHA-2

Is there a list of ciphers that are required for TLS 1.2 ?
0
Comment
Question by:Anthony Lucia
  • 2
3 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39946220
On the page I keep referring you to is a list of the ciphers used by all the versions of SSL and TLS.  However, SHA is Not a cipher, it is a Hash, and it is only used in TLS to create a 'hash' of the message to check the validity of the data.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2

A cipher is two way encryption in that it can be used to both encrypt and decrypt a message.  A hash is a one-way function that is supposed to uniquely identify the data that was used to generate it.  MD5 and SHA are used, for example, to verify file downloads or transfers.  If you generate an MD5 or SHA hash of a file that you have downloaded, it should match the hash that was posted for that file.  The length of an MD5 or SHA hash is fixed and has nothing to do with the length of the file or the size of the data.  http://en.wikipedia.org/wiki/SHA-256
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39946255
Sorry, I did not mean to imply SHA was a cipher, and I now know the difference between them

Thanks for your answer
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39946716
You're welcome.  I've learned a lot of things by stumbling into them and having to figure them.  Glad to help.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question