Solved

Ciphers and TLS 1.2

Posted on 2014-03-21
3
450 Views
Last Modified: 2014-03-21
TLS 1.2 requires SHA-2

Is there a list of ciphers that are required for TLS 1.2 ?
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 39946220
On the page I keep referring you to is a list of the ciphers used by all the versions of SSL and TLS.  However, SHA is Not a cipher, it is a Hash, and it is only used in TLS to create a 'hash' of the message to check the validity of the data.  http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2

A cipher is two way encryption in that it can be used to both encrypt and decrypt a message.  A hash is a one-way function that is supposed to uniquely identify the data that was used to generate it.  MD5 and SHA are used, for example, to verify file downloads or transfers.  If you generate an MD5 or SHA hash of a file that you have downloaded, it should match the hash that was posted for that file.  The length of an MD5 or SHA hash is fixed and has nothing to do with the length of the file or the size of the data.  http://en.wikipedia.org/wiki/SHA-256
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39946255
Sorry, I did not mean to imply SHA was a cipher, and I now know the difference between them

Thanks for your answer
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39946716
You're welcome.  I've learned a lot of things by stumbling into them and having to figure them.  Glad to help.
0

Featured Post

Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question