SlideShare a Scribd company logo
INTRODUCING TLS 1.3
THE FUTURE OF ENCRYPTION – AND TOOK ONLY 28 DRAFTS
TLS 1.3 APPROVED BY IETF.ORG
 After four years and 28 different drafts, the Internet Engineering Task Force has finally approved
TLS 1.3. And even then, TLS 1.3 was only approved at the most recent London meeting after a wave of
last minute activity including an 11th hour pitch from the banking industry to insert a back door.
 That didn’t go over well, but eventually TLS 1.3 won unanimous approval (with one “no objection”) which
sets the stage for it to be implemented in… well, everything.
 TLS 1.3 sees improvements that should seriously hamper any attempts to decrypt intercepted HTTPS
connections and any other encrypted network packets. That’s not going to make the NSA or the Ruskies
too happy, but that’s kind of the point.
TLS 1.3 – THE FASTER ENCRYPTION
 In addition to be even more robust, TLS 1.3 will also streamline the handshake process and allow for
even faster encryption to take place.
 Unfortunately, the work on TLS 1.3 has been extremely slow. Google had problems last year when an IT
administrator for the Maryland school system reported that about one-third of the 50,000 Chromebooks
he had enabled TLS 1.3 on bricked. And then there was the aforementioned incident where the banking
industry complained it wouldn’t be able to decrypt the traffic within its own networks.
TLS 1.3 HOLDS THE COMPLEX ENCRYPTION MECHANISM
 However, the same ability to decrypt data their own data can be used nefariously, much like just about
everything in the banking industry, which makes trusting a banker one of the most dangerous things you
can do in this life. I’m convinced that when Virgil finally leads me on my orientation to hell, the bankers
will have their very own ring. Hopefully several.
 Anyway, back to getting back doored by bankers. The IETF said no. Which means the financial sector will
have to do some extra work in order to inspect TLS 1.3 traffic. Everybody wins.
 Two of the biggest updates to TLS 1.3, and one of the biggest reasons that the banking industry had a
cow, have to do with forward secrecy and ephemeral keys.
TLS 1.3 – THE PERFECT SSL HANDSHAKE
 As you may know, TLS creates an encrypted connection between a client and a server. This is done at the
outset using what we call the “SSL handshake.”
 Unfortunately the previous iterations of the handshake were long and could take half a second. For what
it’s worth a part of me just died typing that last sentence. We live in a world where people are
inconvenienced by half a second.
 But, with TLS 1.2 the handshake took several roundtrips. The client would send something to the server,
then the server would respond, then they would begin a series of hand claps and fist bumps. Eventually
they agree on a session key that uses mutually supported algorithms and ciphers and voila! Encrypted
communication.
TLS 1.3 HOLDS STREAMLINE HANDSHAKE
 TLS 1.3 asks the age old question, “who has that kind of time?” And streamlines the handshake into a
single rountrip proposition that is less like a clubhouse secret handshake and more like the handshake
exchanged by a couple at the end of a long and contentious divorce settlement. Just a perfect economy
of emotion offering an ironic end to a process that was anything but.
TLS 1.3 – THE NEXT GENERATION ENCRYPTION TECHNOLOGY
 Anyway… In addition to that, TLS 1.3 also gets rid of a bunch of outmoded algorithms that have been
found vulnerable.
 RC4 Steam Cipher
 RSA Key Transport
 SHA-1 Hash Function
 CBC Mode Ciphers
 MD5 Algorithm
 Various Diffie-Hellman groups
 EXPORT-strength ciphers
 DES
 3DES
THIS WILL ONLY SPEED TLS 1.3 EVEN MORE.
 Beyond a refined handshake and dropping support for all but the most recent ciphers, TLS 1.3 also
boasts something called 0 RTT resumption. This feature allows two parties to remember the details of
their last session and to resume it without needing to repeat the handshake. Kind of like calling that ex I
mentioned earlier for a quic- [Editor’s Note: CARL!]
 This will only speed TLS 1.3 even more.
 No word yet on TLS 1.4, though the IETF may want to get to work on it now now considering how long
this last one took.
TALK TO SSL OR TLS EXPERTS AT RAPIDSSLONLINE.COM
 Official website; https://www.rapidsslonline.com/
 SSL certificate blog; https://www.rapidsslonline.com/blog/
 A complete research on TLS 1.3 – The future of Encryption Mechanism
 Talk to SSL or TLS Experts at Twitter | Facebook | Google+ | Medium | Dzone

More Related Content

PDF
How broken is TLS?
PDF
Nmap flags table
PPTX
Clk-to-q delay, library setup and hold time
PPTX
Spanner
PDF
Use TestRPC in Remix
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
PPTX
TLS - Transport Layer Security
How broken is TLS?
Nmap flags table
Clk-to-q delay, library setup and hold time
Spanner
Use TestRPC in Remix
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS - Transport Layer Security

Similar to Introducing TLS 1.3 – The future of Encryption (20)

PPTX
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
PDF
Why Many Websites are still Insecure (and How to Fix Them)
ODP
Tls 1.3
PDF
OSDC 2018 | Hitchhiker’s guide to TLS 1.3 and GnuTLS by Ander Juaristi Alamos
PPTX
Sequere socket Layer
PPTX
Cours4.pptx
PDF
Introduction to TLS 1.3
PDF
Introduction to TLS-1.3
PDF
Study and analysis of some known attacks on transport layer security
PPTX
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
PDF
Transport Layer Security
PPTX
SSL/TLS Eavesdropping with Fullpath Control
DOCX
What is TLS/SSL?
DOCX
Transport Layer Security
PDF
Rootconf2019
PDF
Differences to Know Between SSL & TLS certificate .pdf
PPTX
Ssl and tls
PDF
Ssl And Tls Theory And Practice 2nd Rolf Oppliger
PDF
The TLS/SSLv3 renegotiation vulnerability explained
PPT
Ssl https
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
Why Many Websites are still Insecure (and How to Fix Them)
Tls 1.3
OSDC 2018 | Hitchhiker’s guide to TLS 1.3 and GnuTLS by Ander Juaristi Alamos
Sequere socket Layer
Cours4.pptx
Introduction to TLS 1.3
Introduction to TLS-1.3
Study and analysis of some known attacks on transport layer security
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
Transport Layer Security
SSL/TLS Eavesdropping with Fullpath Control
What is TLS/SSL?
Transport Layer Security
Rootconf2019
Differences to Know Between SSL & TLS certificate .pdf
Ssl and tls
Ssl And Tls Theory And Practice 2nd Rolf Oppliger
The TLS/SSLv3 renegotiation vulnerability explained
Ssl https
Ad

More from RapidSSLOnline.com (20)

PPTX
Tackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
PPTX
Viewing SSL Certificate in Chrome | RapidSSLonline
PDF
Compare GeoTrust True BusinessID SSL Data Sheet
PPTX
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
PDF
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
PDF
Adobe Connect on-premise SSL Guide
PPTX
How to Move SSL Certificate from Windows Server to Another Windows Server
PPTX
Symmetric and Asymmetric Encryption
PDF
SSL / TLS Validation | CASecurity.org | RapidSSLonline
PDF
Geek Guide: Apache Web Servers and SSL Authentication
PDF
All About SSL/TLS
PDF
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
PDF
Google Chrome 56 What You Need to Know?
PDF
The Hidden Costs of SelfSigned SSL Certificates
PDF
5 Steps for Preventing Ransomware
PDF
2016 Symantec Internet Security Threat Report
PPTX
How Does The Wildcard SSL Work?
PDF
Uncover threats and protect your organization
PDF
A New Zero-Day Vulnerability Discovered Every Week in 2015
PDF
Symantec 2016 Security Predictions - Looking ahead
Tackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
Viewing SSL Certificate in Chrome | RapidSSLonline
Compare GeoTrust True BusinessID SSL Data Sheet
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Adobe Connect on-premise SSL Guide
How to Move SSL Certificate from Windows Server to Another Windows Server
Symmetric and Asymmetric Encryption
SSL / TLS Validation | CASecurity.org | RapidSSLonline
Geek Guide: Apache Web Servers and SSL Authentication
All About SSL/TLS
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
Google Chrome 56 What You Need to Know?
The Hidden Costs of SelfSigned SSL Certificates
5 Steps for Preventing Ransomware
2016 Symantec Internet Security Threat Report
How Does The Wildcard SSL Work?
Uncover threats and protect your organization
A New Zero-Day Vulnerability Discovered Every Week in 2015
Symantec 2016 Security Predictions - Looking ahead
Ad

Recently uploaded (20)

PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPT
tcp ip networks nd ip layering assotred slides
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Introduction to Information and Communication Technology
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Digital Literacy And Online Safety on internet
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Introduction to the IoT system, how the IoT system works
PPTX
artificial intelligence overview of it and more
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Introuction about ICD -10 and ICD-11 PPT.pptx
Funds Management Learning Material for Beg
presentation_pfe-universite-molay-seltan.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
tcp ip networks nd ip layering assotred slides
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Introduction to Information and Communication Technology
Power Point - Lesson 3_2.pptx grad school presentation
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Digital Literacy And Online Safety on internet
Cloud-Scale Log Monitoring _ Datadog.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introuction about WHO-FIC in ICD-10.pptx
Introduction to the IoT system, how the IoT system works
artificial intelligence overview of it and more
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...

Introducing TLS 1.3 – The future of Encryption

  • 1. INTRODUCING TLS 1.3 THE FUTURE OF ENCRYPTION – AND TOOK ONLY 28 DRAFTS
  • 2. TLS 1.3 APPROVED BY IETF.ORG  After four years and 28 different drafts, the Internet Engineering Task Force has finally approved TLS 1.3. And even then, TLS 1.3 was only approved at the most recent London meeting after a wave of last minute activity including an 11th hour pitch from the banking industry to insert a back door.  That didn’t go over well, but eventually TLS 1.3 won unanimous approval (with one “no objection”) which sets the stage for it to be implemented in… well, everything.  TLS 1.3 sees improvements that should seriously hamper any attempts to decrypt intercepted HTTPS connections and any other encrypted network packets. That’s not going to make the NSA or the Ruskies too happy, but that’s kind of the point.
  • 3. TLS 1.3 – THE FASTER ENCRYPTION  In addition to be even more robust, TLS 1.3 will also streamline the handshake process and allow for even faster encryption to take place.  Unfortunately, the work on TLS 1.3 has been extremely slow. Google had problems last year when an IT administrator for the Maryland school system reported that about one-third of the 50,000 Chromebooks he had enabled TLS 1.3 on bricked. And then there was the aforementioned incident where the banking industry complained it wouldn’t be able to decrypt the traffic within its own networks.
  • 4. TLS 1.3 HOLDS THE COMPLEX ENCRYPTION MECHANISM  However, the same ability to decrypt data their own data can be used nefariously, much like just about everything in the banking industry, which makes trusting a banker one of the most dangerous things you can do in this life. I’m convinced that when Virgil finally leads me on my orientation to hell, the bankers will have their very own ring. Hopefully several.  Anyway, back to getting back doored by bankers. The IETF said no. Which means the financial sector will have to do some extra work in order to inspect TLS 1.3 traffic. Everybody wins.  Two of the biggest updates to TLS 1.3, and one of the biggest reasons that the banking industry had a cow, have to do with forward secrecy and ephemeral keys.
  • 5. TLS 1.3 – THE PERFECT SSL HANDSHAKE  As you may know, TLS creates an encrypted connection between a client and a server. This is done at the outset using what we call the “SSL handshake.”  Unfortunately the previous iterations of the handshake were long and could take half a second. For what it’s worth a part of me just died typing that last sentence. We live in a world where people are inconvenienced by half a second.  But, with TLS 1.2 the handshake took several roundtrips. The client would send something to the server, then the server would respond, then they would begin a series of hand claps and fist bumps. Eventually they agree on a session key that uses mutually supported algorithms and ciphers and voila! Encrypted communication.
  • 6. TLS 1.3 HOLDS STREAMLINE HANDSHAKE  TLS 1.3 asks the age old question, “who has that kind of time?” And streamlines the handshake into a single rountrip proposition that is less like a clubhouse secret handshake and more like the handshake exchanged by a couple at the end of a long and contentious divorce settlement. Just a perfect economy of emotion offering an ironic end to a process that was anything but.
  • 7. TLS 1.3 – THE NEXT GENERATION ENCRYPTION TECHNOLOGY  Anyway… In addition to that, TLS 1.3 also gets rid of a bunch of outmoded algorithms that have been found vulnerable.  RC4 Steam Cipher  RSA Key Transport  SHA-1 Hash Function  CBC Mode Ciphers  MD5 Algorithm  Various Diffie-Hellman groups  EXPORT-strength ciphers  DES  3DES
  • 8. THIS WILL ONLY SPEED TLS 1.3 EVEN MORE.  Beyond a refined handshake and dropping support for all but the most recent ciphers, TLS 1.3 also boasts something called 0 RTT resumption. This feature allows two parties to remember the details of their last session and to resume it without needing to repeat the handshake. Kind of like calling that ex I mentioned earlier for a quic- [Editor’s Note: CARL!]  This will only speed TLS 1.3 even more.  No word yet on TLS 1.4, though the IETF may want to get to work on it now now considering how long this last one took.
  • 9. TALK TO SSL OR TLS EXPERTS AT RAPIDSSLONLINE.COM  Official website; https://www.rapidsslonline.com/  SSL certificate blog; https://www.rapidsslonline.com/blog/  A complete research on TLS 1.3 – The future of Encryption Mechanism  Talk to SSL or TLS Experts at Twitter | Facebook | Google+ | Medium | Dzone