Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

A brief introduction to PSK in TLS

2025-01-21 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

The purpose of PSK

   We all know that TLS needs to rely on asymmetric algorithms (RSK,EC,DS,DH...) for key exchange and identity authentication, but the time-consuming and computing resources of asymmetric algorithms are sensitive to resources or time-consuming scenarios, so you want to optimize them. In this article, we briefly introduce an optimization method provided by the TLS standard itself: PSK.

The status of PSK in the world

   PSK is probably the oldest way of secret key exchange and authentication, but its status in TLS is relatively low, from the earliest informal optimization scheme to the history of comparing TLS with its own RFC number RFC4279 (December 2005).

The core purpose of PSK in TLS

   is an excerpt from the original text from RFC.

This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. One, The first set of ciphersuites uses only symmetric key operations for authentication. TLS_PSK_WITH_RC4_128_SHA PSK RC4_128 SHATLS_PSK_WITH_3DES_EDE_CBC_SHA PSK 3DES_EDE_CBC SHATLS_PSK_WITH_AES_128_CBC_SHA PSK AES_128_CBC SHATLS_PSK_WITH_AES_256_CBC_SHA PSK AES_256_CBC SHA II The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, andTLS_DHE_PSK_WITH_RC4_128_SHA DHE_PSK RC4_128 SHATLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA DHE_PSK 3DES_EDE_CBC SHATLS_DHE_PSK_WITH_AES_128_CBC_SHA DHE_PSK AES_128_CBC SHATLS_DHE_PSK_WITH_AES_256_CBC_SHA DHE_PSK AES_256_CBC SHA three The third set combines public key authentication of the server with pre-shared key authentication of the client.TLS_RSA_PSK_WITH_RC4_128_SHA RSA_PSK RC4_128 SHA TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA RSA_PSK 3DES_EDE_CBC SHA TLS_RSA_PSK_WITH_AES_128_CBC_SHA RSA_PSK AES_128_CBC SHA TLS_RSA_PSK_WITH_AES_256_CBC_SHA RSA_PSK AES_256_CBC SHA

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report