1 %%\subsection{Architectural overview }
3 This section defines some terms which will be used throughout this guide.
6 A cipher suite is a standardised collection of key exchange algorithms, encryption
7 algorithms (ciphers) and Message authentication codes (MAC) that provides authenticated
8 encryption schemes. It consists of the following components:
11 \item{Key exchange protocol:}
12 ``An (interactive) key exchange protocol is a method whereby parties who do not
13 share any secret information can generate a shared, secret key by communicating
14 over a public channel. The main property guaranteed here is that an
15 eavesdroppin adversary who sees all the messages sent over the communication
16 line does not learn anything about the resulting secret key.'' \cite{katz2008introduction}
18 Example: DH, ECDH, DHE, ECDHE, RSA
20 \item{Authentication:}
21 The client authenticates the server by its certificate. Optionally the server
22 may authenticate the client certificate.
24 Example: RSA, ECDSA, DSA
27 The cipher is used to encrypt the message stream. It also contains the key size
28 and mode used by the suite.
30 Example: AES128, AES128\_GCM, Camellia128
32 \item{Message authentication code (MAC):}
33 A MAC ensures that the message has not been tampered with (integrity).
35 Examples: SHA256, SHA384, SHA
37 \todo{find a good visualisation for a cipher suite composition}
39 \item{Authenticated encryption scheme:}
40 An encryption scheme which provides for confidentiality, integrity and authenticity.