Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Which algorithm is stronger for TLS: AES-256 or Camellia-256?

Tags:

ssl

encryption

Introduction: For my personal webserver I have setup apache with a self signed certificate to enable TLS security to learn and test. I have this line in virtualhost:

SSLProtocol -all -SSLv3 +TLSv1  
SSLCipherSuite TLSv1:+HIGH:!MEDIUM

With firefox, I get Camellia-256 encrypted connection, and with opera I get TLS v1.0 256 bit AES (1024 bit DHE_RSA/SHA) with the same config in same server.

That leads me to question, which is stronger, AES, or Camellia?

I noticed that if I disable camellia with SSLCipherSuite TLSv1:+HIGH:!MEDIUM:!CAMELLIA then, firefox takes the same suite than opera.

In my config, I also try to disable all SSL versions to enable only TLS (advise needed if I didn't do so correctly), but the original question still stands: Which one should be stronger?

like image 632
StormByte Avatar asked Apr 30 '12 03:04

StormByte


People also ask

Does TLS use AES 256?

TLS is a set of industry-standard cryptographic protocols used for encrypting information that is exchanged over the network. AES-256 is a 256-bit encryption cipher used for data transmission in TLS.

What are the main encryption algorithms used today in the cipher suites of TLS?

AES, 3DES and CAMELLA are the most common bulk data encryption algorithms used by cipher suites.

What encryption algorithm does TLS 1.2 use?

AES is the most commonly supported bulk cipher in TLS 1.2 & TLS 1.3 cipher suites.

What is 256-bit TLS encryption?

256-bit encryption is refers to the length of the encryption key used to encrypt a data stream or file. A hacker or cracker will require 2256 different combinations to break a 256-bit encrypted message, which is virtually impossible to be broken by even the fastest computers.


2 Answers

I would be more worried about the fact that your SSL encryption is not secure because you are only using 1024 bit asymmetric encryption to protect your keys.

Adi Shamir (the 'S' in RSA) recommended moving to 2048 bit keys back in 2006, even the american standards institute (NIST) have made 2048 bit a required minimum strength since January 2011 (see NIST SP800-57 for recommended minumum key strengths -- this states 2048 bit for both RSA and DH/el-gamal).

In short, make sure your RSA encryption is strong enough first, as it is used to protect the symmetric keys (AES/Camellia). Never rely on a key which is protected by a weaker key (this is like using a secure 256 bit random WPA 2 key on a wireless access point and then trusting it to WPS which will reveal in in a few hours!)

Even if this is a test system, learn to use crypto the way you intend to go forward; do not compromise on certificate key strength (all CAs these days should reject 1024 bit requests or CSRs using MD5 on sight, if not don't use them; create your own test certs as you would a real request, and don't use default key sizes).

Difficult to compare strengths, both have received cryptographic analysis (AES more publicly) and are adequate for securing data.

At the risk of repeating myself, I’d be more worried about the 1024 bits used to secure the key negotiation.

like image 87
Graham Coles Avatar answered Sep 28 '22 01:09

Graham Coles


It's hard to judge the strength of these algorithms. Camellia is considered roughly equivalent to AES in security (source). In any case, the difference probably won't matter. Either algorithm is secure enough to make your data channel no longer be the weakest link in your system, so you don't need to bother modifying any configuration.

like image 43
Oleksi Avatar answered Sep 28 '22 02:09

Oleksi