Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Ciphers and TLS 1.2

Posted on 2014-03-21
3
Medium Priority
?
484 Views
Last Modified: 2014-03-21
TLS 1.2 requires SHA-2

Is there a list of ciphers that are required for TLS 1.2 ?
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 84

Accepted Solution

by:
Dave Baldwin earned 2000 total points
ID: 39946220
On the page I keep referring you to is a list of the ciphers used by all the versions of SSL and TLS.  However, SHA is Not a cipher, it is a Hash, and it is only used in TLS to create a 'hash' of the message to check the validity of the data.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2

A cipher is two way encryption in that it can be used to both encrypt and decrypt a message.  A hash is a one-way function that is supposed to uniquely identify the data that was used to generate it.  MD5 and SHA are used, for example, to verify file downloads or transfers.  If you generate an MD5 or SHA hash of a file that you have downloaded, it should match the hash that was posted for that file.  The length of an MD5 or SHA hash is fixed and has nothing to do with the length of the file or the size of the data.  http://en.wikipedia.org/wiki/SHA-256
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39946255
Sorry, I did not mean to imply SHA was a cipher, and I now know the difference between them

Thanks for your answer
0
 
LVL 84

Expert Comment

by:Dave Baldwin
ID: 39946716
You're welcome.  I've learned a lot of things by stumbling into them and having to figure them.  Glad to help.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question