Solved

Ciphers and TLS 1.2

Posted on 2014-03-21
3
427 Views
Last Modified: 2014-03-21
TLS 1.2 requires SHA-2

Is there a list of ciphers that are required for TLS 1.2 ?
0
Comment
Question by:Anthony Lucia
  • 2
3 Comments
 
LVL 82

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39946220
On the page I keep referring you to is a list of the ciphers used by all the versions of SSL and TLS.  However, SHA is Not a cipher, it is a Hash, and it is only used in TLS to create a 'hash' of the message to check the validity of the data.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2

A cipher is two way encryption in that it can be used to both encrypt and decrypt a message.  A hash is a one-way function that is supposed to uniquely identify the data that was used to generate it.  MD5 and SHA are used, for example, to verify file downloads or transfers.  If you generate an MD5 or SHA hash of a file that you have downloaded, it should match the hash that was posted for that file.  The length of an MD5 or SHA hash is fixed and has nothing to do with the length of the file or the size of the data.  http://en.wikipedia.org/wiki/SHA-256
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39946255
Sorry, I did not mean to imply SHA was a cipher, and I now know the difference between them

Thanks for your answer
0
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 39946716
You're welcome.  I've learned a lot of things by stumbling into them and having to figure them.  Glad to help.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video discusses moving either the default database or any database to a new volume.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now