TLS False Start

A TLS false start is a feature of Transport Layer Security that reduces some of the latency required by the protocol‘s encryption and authentication processes. Transport Layer Security (TLS) superseded SSL (Secure Socket Layer) protocols, and both are intended to encrypt Internet sessions between two parties, a client and a server. The client, usually an individual Internet user, and the server, a website or network, must communicate to establish a connection to transfer data. TLS is a protocol that aims to secure that connection so that attackers cannot steal confidential information from the Internet session (such as a bank account login or credit card purchase).

The TLS handshake process creates a secure channel to establish an encryption key by:

  • Deciding which cipher to use
  • Choosing a TLS version that works for both
  • Authenticating the parties’ identities, perhaps by using a digital certificate authority

The TLS protocol causes higher latency because the handshake and encryption process takes longer than an unsecured Internet session protocol would. Choosing which cipher the client and server will use takes time, as does authentication. The term false start refers to beginning the transfer of data a little bit early when one of the parties has already completed the choice of cipher and authenticated their identity but has not received confirmation of the same from the other party. This reduces latency somewhat.

A TLS false start is intended to speed the significantly slowed TLS protocol. A client or server can begin to transmit data more quickly. A false start reduces the round trip time (RTT) of the TLS protocol from two to one.

Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.

Related Articles

Special Character

A special character is one that is not considered a number or letter. Symbols, accent marks, and punctuation marks are considered special characters. Similarly,...


Table of contents What is Software? History of Software Software vs. Hardware Software vs. Hardware Comparison Chart What Types of Software Exist? Saas vs....

Email Address

What is an Email Address? An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a...

Information Technology (IT) Architect

The information technology architect applies IT resources to meet specific business requirements. The role requires a high degree of technical expertise as well as...


Geotargeting is a method of delivering data or content to users based on...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...