Understanding TLS and its cipher suite - Part 1



Key exchange algorithms protect information required to create shared keys. These algorithms are asymmetric (public key algorithms) and perform well for relatively small amounts of data.
Bulk encryption algorithms encrypt messages exchanged between clients and servers. These algorithms are symmetric and perform well for large amounts of data.
Message authentication algorithms generate message hashes and signatures that ensure the integrity of a message. Other scheme used here includes HMAC.










MAC - Common message authentication scheme are HMAC,  OMACCBC-MAC and PMAC. Newer and better ones would be AES-GCM and ChaCha2, Poly1305



Comments

Popular posts from this blog

The specified initialization vector (IV) does not match the block size for this algorithm