What is tls 1.3
Last updated: April 1, 2026
Key Facts
- TLS 1.3 was officially released in August 2018 by the Internet Engineering Task Force (IETF)
- It reduces the connection handshake from 2 round-trips to just 1 in most cases, improving speed by approximately 25%
- TLS 1.3 removed outdated cipher suites and cryptographic algorithms, keeping only the most secure options
- It encrypts more of the handshake process, improving privacy by protecting client and server information
- TLS 1.3 is gradually becoming the standard, with major browsers and services now supporting it alongside TLS 1.2
What is TLS 1.3?
TLS 1.3 is the latest version of the Transport Layer Security protocol, officially released in August 2018 by the Internet Engineering Task Force (IETF). It represents a significant modernization of cryptographic internet security, introducing substantial improvements in both security and performance compared to its predecessor, TLS 1.2. As cyber threats have evolved and computing power has increased, TLS 1.3 was redesigned from the ground up to meet contemporary security challenges while reducing connection latency.
Major Improvements Over TLS 1.2
TLS 1.3 introduces several critical enhancements:
- Faster Handshake - Reduces the connection setup from 2 round-trips to just 1 in most cases, significantly improving page load times
- Stronger Security - Removes weak cipher suites and outdated cryptographic algorithms
- Enhanced Privacy - Encrypts more of the handshake process, protecting information previously sent in cleartext
- Better Performance - Streamlined protocol design reduces computational overhead
- Simplified Complexity - Eliminates optional features that rarely get used, reducing code complexity and potential vulnerabilities
How TLS 1.3 Works
TLS 1.3 maintains the basic security principles of previous versions while streamlining the process. The handshake establishes a secure connection with fewer steps. Clients and servers can now send encrypted data in their first round-trip, a feature called "0-RTT" (zero round-trip time) in specific scenarios, further reducing latency. The protocol uses only the most modern and secure cipher suites, including CHACHA20-POLY1305 and AES-GCM encryption. It also enforces forward secrecy, meaning even if a server's private key is compromised, past communications remain secure.
Security Features
TLS 1.3 significantly enhances security by removing deprecated algorithms and enforcing best practices. It eliminates support for older cryptographic methods known to have vulnerabilities. The protocol uses Diffie-Hellman key exchange or elliptic curve Diffie-Hellman (ECDH) for establishing shared secrets, both providing forward secrecy. Message authentication has been improved, and the protocol resists many types of attacks that could affect earlier versions. These changes make TLS 1.3 substantially more resistant to both current and anticipated future threats.
Adoption and Current Status
TLS 1.3 adoption has been rapid since its release. Major web browsers including Chrome, Firefox, Safari, and Edge now support it. Most modern web servers and cloud services have implemented TLS 1.3 support. Industry surveys show that a significant portion of HTTPS traffic now uses TLS 1.3. However, TLS 1.2 remains important for compatibility with legacy systems and older devices. Organizations are encouraged to support both TLS 1.2 and TLS 1.3, with gradual migration toward TLS 1.3 as the primary protocol.
Related Questions
How much faster is TLS 1.3 than TLS 1.2?
TLS 1.3 is approximately 25% faster than TLS 1.2 for connection establishment due to reducing the handshake from 2 round-trips to 1. The 0-RTT feature can make it even faster in specific scenarios by allowing data transmission before the handshake completes.
Do I need to upgrade to TLS 1.3?
Most users automatically benefit from TLS 1.3 through browser and server updates. However, organizations with legacy systems may need TLS 1.2 support. TLS 1.3 is recommended for optimal security and performance, but TLS 1.2 remains secure and widely supported.
What cipher suites does TLS 1.3 support?
TLS 1.3 supports only modern cipher suites: TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, and TLS_AES_128_GCM_SHA256. This limited selection removes weaker options, significantly improving overall security compared to TLS 1.2's broader set of cipher suites.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Transport Layer SecurityCC-BY-SA-4.0
- IETF RFC 8446 - TLS 1.3 SpecificationIETF
- SSL.com - TLS 1.3 GuideCC-BY-2.0