Appendix B. Glossary
This glossary defines key terms used in RFC 5246.
Core Terms
Advanced Encryption Standard (AES)
- AES is a widely used symmetric key encryption standard. TLS 1.2 supports AES-128 and AES-256.
Application layer
- The highest protocol layer that typically provides services directly to users.
Application protocol
- A protocol that uses TLS as its security sublayer.
Asymmetric cipher
- Also known as public key cryptography. Uses a pair of different keys for encryption and decryption.
Authentication
- The process of verifying the identity of an entity.
Block cipher
- An encryption algorithm that transforms fixed-size plaintext blocks into ciphertext blocks of the same size.
Bulk cipher
- A traditional symmetric algorithm used for encrypting large amounts of data, as opposed to public key algorithms.
Cipher Block Chaining (CBC)
- A block cipher mode of operation where each plaintext block is XORed with the previous ciphertext block before encryption.
Certificate
- An X.509 certificate containing a public key and subject identity information, signed by a certificate authority.
Certificate Authority (CA)
- A trusted entity that issues digital certificates.
Client
- The application entity that initiates a TLS connection.
Client hello
- The first message sent by the client to the server to initiate a TLS session.
Client key exchange
- A handshake message sent by the client containing information used to compute the pre-master secret.
Client write key
- The bulk cipher key used by the client to encrypt data.
Client write MAC key
- The key used by the client for MAC operations.
Connection
- A connection is a transport (in the OSI layering model definition) that provides a suitable type of service. For TLS, such connections are peer-to-peer relationships. The connections are transient. Every connection is associated with one session.
Data Encryption Standard (DES)
- DES is a widely used symmetric key encryption method. DES is not recommended for use in TLS 1.2.
Digital Signature Standard (DSS)
- A NIST standard based on the Digital Signature Algorithm (DSA).
Diffie-Hellman (DH)
- A key agreement protocol that allows two parties to establish a shared secret over an insecure channel.
Ephemeral Diffie-Hellman (DHE)
- Diffie-Hellman key exchange using ephemeral keys, providing forward secrecy.
Finished
- A handshake protocol message that verifies successful completion of the key exchange and authentication process.
Handshake
- The initial negotiation required to establish TLS session parameters.
Hash function
- A function that converts an arbitrary-length input into a fixed-length output.
HMAC (Hash-based Message Authentication Code)
- A message authentication code using a cryptographic hash function and a secret key.
Initialization Vector (IV)
- A random value that provides initial state for a block cipher.
MAC (Message Authentication Code)
- A short piece of information used to verify message integrity.
Master secret
- A 48-byte secret derived from the pre-master secret, used to generate key material.
MD5 (Message Digest 5)
- A cryptographic hash function that produces a 128-bit hash value. Use of MD5 alone is no longer recommended in TLS 1.2.
Pre-master secret
- The secret negotiated or transmitted during key exchange, used to derive the master secret.
Public key cryptography
- An encryption method using key pairs where one key can be made public.
Record
- The basic data transmission unit of the TLS record layer protocol.
RSA (Rivest-Shamir-Adleman)
- A widely used public key encryption algorithm.
Server
- The application entity that responds to TLS connection requests.
Server hello
- The message sent by the server in response to the client hello.
Session
- A TLS session is an association between peers. Sessions are created by the handshake protocol. Sessions define a set of cryptographic security parameters that can be shared among multiple connections.
Session identifier
- A value chosen by the server to identify an active or resumable session state.
SHA (Secure Hash Algorithm)
- A family of cryptographic hash functions designed by NIST, including SHA-1, SHA-256, SHA-384, etc.
Stream cipher
- An encryption algorithm that encrypts plaintext bit by bit or byte by byte.
Symmetric cipher
- A cipher algorithm that uses the same key for both encryption and decryption.
Transport Layer Security (TLS)
- This protocol; TLS 1.2 is its third major version. TLS 1.0, 1.1, and 1.2 are based on SSL 3.0.
Verify data
- A 12-byte value included in the Finished message to verify handshake integrity.
Note: For complete term definitions and detailed explanations, please refer to the full text of Appendix B in RFC 5246.