Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1160

TLS Handshake

What is TLS Handshake?

TLS HandshakeThe initial protocol exchange in Transport Layer Security that authenticates the server (and optionally the client) and derives the symmetric keys used to encrypt the rest of the session.


The TLS handshake negotiates the protocol version, cipher suite, server identity, and session keys before any application data is sent. In TLS 1.2 (RFC 5246) the handshake takes two round trips and uses ClientHello, ServerHello, Certificate, ServerKeyExchange, plus a Finished pair that confirms the negotiated transcript. TLS 1.3 (RFC 8446) collapses this to one round trip, removes legacy ciphers (RC4, CBC modes without AEAD, RSA key exchange), and supports 0-RTT resumption with replay caveats. Both versions use ephemeral (EC)DHE for forward secrecy and authenticate the server via an X.509 certificate. Misconfigurations that matter include downgrade attacks, weak cipher suites, expired or mis-issued certificates, and missing SNI handling on shared infrastructure.

Examples

  1. 01

    A browser opens TLS 1.3 to https://example.com in one round trip, negotiating x25519 and AES-GCM.

  2. 02

    An older client falls back to TLS 1.2 with ECDHE-RSA-AES256-GCM-SHA384 against the same server.

Frequently asked questions

What is TLS Handshake?

The initial protocol exchange in Transport Layer Security that authenticates the server (and optionally the client) and derives the symmetric keys used to encrypt the rest of the session. It belongs to the Network Security category of cybersecurity.

What does TLS Handshake mean?

The initial protocol exchange in Transport Layer Security that authenticates the server (and optionally the client) and derives the symmetric keys used to encrypt the rest of the session.

How does TLS Handshake work?

The TLS handshake negotiates the protocol version, cipher suite, server identity, and session keys before any application data is sent. In TLS 1.2 (RFC 5246) the handshake takes two round trips and uses ClientHello, ServerHello, Certificate, ServerKeyExchange, plus a Finished pair that confirms the negotiated transcript. TLS 1.3 (RFC 8446) collapses this to one round trip, removes legacy ciphers (RC4, CBC modes without AEAD, RSA key exchange), and supports 0-RTT resumption with replay caveats. Both versions use ephemeral (EC)DHE for forward secrecy and authenticate the server via an X.509 certificate. Misconfigurations that matter include downgrade attacks, weak cipher suites, expired or mis-issued certificates, and missing SNI handling on shared infrastructure.

How do you defend against TLS Handshake?

Defences for TLS Handshake typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for TLS Handshake?

Common alternative names include: TLS handshake protocol.

Related terms

See also