Cipher Suites

A Cipher Suites is basically a complete set of algorithms needed to secure a network connection through TLS/SSL. One Cipher suite typically consists of 1 key exchange, 1 Authentication Algorithm, 1 Bulk encryption, and 1 MAC Algorithm.

Cipher Suites Algorithms describes below:

  • Key Exchange Algorithm - Describes the manner by which asymmetric (public key algorithms) keys will be exchanged.
  • Authentication Algorithm - Describes how client/server authentication will be carried out.
  • Bulk Encryption Algorithm - Describes how (which symmetric key algorithm) actual data will be encrypted between client and server.
  • Message Authentication Code (MAC) Algorithm - Generate message hashes and signatures that ensure the integrity of a message.
Some Key Exchange Algorithm: RSA, DH, ECDH, ECDHE
Some Authentication Algorithm: RSA, DSA, ECDSA
Some Bulk Encryption Algorithm: AES, 3DES, DES
Some MAC Algorithm: SHA, MD5

Let's take an example of Cipher Suite (list of Cipher Suites):

TLS_DHE_DSS_WITH_AES_128_CBC_SHA256

Let's break that down:

TLS - Protocol
DHE - Key Exchange Algorithm
DSS - Authentication Algorithm
AES_128_CBC - Bulk Encryption Algorithm
SHA253 - MAC Algorithm

We can use below link to check Cipher Suites supported by our browser

https://www.ssllabs.com/ssltest/viewMyClient.html

Cipher Suites are used in network connections secured by TLS/SSL. that means, network protocols like HTTPS, SFTP, WebDAV, AS2, POP3, IMAP and SMTP, all use cipher suites.

Types of Ciphers


Modern algorithms are those that are used in current technology e.g. Block Ciphers, Stream Ciphers, etc. These algorithms are very secure.


  1. Block Ciphers
  2. Stream Ciphers


  • Asymmetric key based cryptosystems and block ciphers usually take more time to encrypt/decrypt data and hence found not suitable for real time applications.
  • Symmetric key based cryptosystems and stream ciphers are generally recommended for securing data in real time. E.g. Encrypt DVD content, which playback the DVD content in real time by decrypting and integrating with a customized media player.


full-width

Post a Comment

1 Comments