Cipher Suite Explained Component by Component

Published: (March 2, 2026 at 03:13 AM EST)
2 min read
Source: Dev.to

Source: Dev.to

Cover image for Cipher Suite Explained Component by Component

Key Exchange

How the keys are exchanged.

  • DH / DHE – Diffie‑Hellman (Ephemeral) – short‑lived keys
  • ADH – Anonymous Diffie‑Hellman
  • ECDHE – Elliptic Curve Diffie‑Hellman Ephemeral
  • RSA – RSA key exchange

Authentication

Digital signature algorithms used to confirm that the client is communicating with the intended server. The server sends its certificate (containing the public key) to the client.

  • RSA
  • ECDSA – Elliptic Curve Digital Signature Algorithm

Bulk Encryption Cipher

Encrypts the data being transmitted. Two families of ciphers are used:

Stream Cipher

Operates on data one byte at a time, converting a shared key into a keystream that encrypts plaintext. The remote end generates the same keystream to decrypt.

Block Cipher

Operates on fixed‑size blocks of data. While stream ciphers are generally faster, block ciphers provide stronger security.

Common block ciphers:

  • DES – 56‑bit key, 8‑byte blocks
  • TDES (Triple DES) – 168‑bit key, 8‑byte blocks
  • AES – 128‑bit block size (16 bytes), key sizes of 128, 192, or 256 bits

Example: AES (Advanced Encryption Standard)

Refer to Wikipedia for more details on bulk encryption algorithms.

Hash or MAC

MAC (Message Authentication Code) verifies the legitimacy and integrity of transmitted data, ensuring it has not been altered or tampered with.

  • SHA family (e.g., SHA‑256)
  • MD5 (now considered weak)

Refer to Wikipedia for more information on MACs.

0 views
Back to Blog

Related posts

Read more »

Google Quantum-Proofs HTTPS

Background An anonymous reader quotes a report from Ars Technica: Google on Friday unveiled its plan for its Chrome browser to secure HTTPS certificates agains...