Ciphersuites

The fun part of applied cryptography is combining one or more of the preceding algorithm types to achieve specifically desired security properties. In many communication protocols, these algorithm groupings are often called ciphersuites. Depending on the protocol at hand, a ciphersuite specifies the particular set of algorithms, possible key lengths, and uses of each.

Ciphersuites can be specified and enumerated in different ways. For example, Transport Layer Security (TLS) offers a wide array of ciphersuites to protect network sessions for web services, general HTTP traffic, Real-Time Protocols (RTP), and many others. An example TLS ciphersuite enumeration and interpretation is TLS_RSA_WITH_AES_128_GCM_SHA256, which interprets ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.