Skip to content

TLS Cipher Suites 2026: Distribution Report

Key idea:

Enterno.io scanned TLS handshakes for the top-100k sites (March 2026) and recorded the negotiated cipher suite in TLS 1.3 or TLS 1.2. Leader: AES-128-GCM (42%), then AES-256-GCM (28%), ChaCha20-Poly1305 (24%). 3DES is extinct. TLS 1.0/1.1 — just 0.8% (legacy). Cloudflare/Google edge prefer ChaCha20 for mobile (ARM without AES-NI).

Below: key findings, platform breakdown, implications, methodology, FAQ.

Key Findings

MetricPass-rate / ValueMedianp75
AES-128-GCM-SHA25642%
AES-256-GCM-SHA38428%
ChaCha20-Poly130524%
AES-128-CBC (legacy)5%
3DES / DES0%
TLS 1.3 handshake67%
TLS 1.2 handshake32%
TLS 1.0 / 1.10.8%

Breakdown by Platform

PlatformSharePass / Detailavg
Cloudflare edge21%ChaCha20: 38% / AES: 62%
AWS CloudFront14%AES-128-GCM: 85%
Google Frontend9%ChaCha20: 55%
Fastly4%AES-256-GCM: 72%
Nginx default26%AES-128-GCM: 88%
Apache default18%AES-128-GCM: 82%

Why It Matters

  • ChaCha20-Poly1305 is recommended for mobile — ARM without AES-NI computes it 3x faster than AES-256
  • TLS 1.3 displacing TLS 1.2 — 67% of negotiations in 2026. Mozilla and Google plan to disable TLS 1.2 by 2027
  • 3DES (CVE-2016-2183 Sweet32) is gone — not offered by any top-100k site
  • Cipher suite priority: AES-256-GCM (strong server) → AES-128-GCM → ChaCha20 (ARM fallback)

Methodology

Top-100k Tranco list (March 2026). TLS handshake via openssl s_client -connect -servername -tls1_3 / -tls1_2. Cipher suite extracted from Cipher: field. Server groups: by SOA/CNAME and Server HTTP header.

CertificateExpiry, issuer, domains (SAN)
ChainIntermediate and root CA validation
TLS ProtocolTLS version and cipher suite
VulnerabilitiesHeartbleed, POODLE, weak ciphers

Why teams trust us

TLS 1.3
supported
Full
CA chain check
<2s
result
30/14/7
days-to-expiry alerts

How it works

1

Enter domain

2

TLS chain verified

3

Expiry date & vulnerabilities

What Does the SSL Check Cover?

SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.

Certificate Details

Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).

Chain of Trust

Full chain verification: from leaf certificate through intermediates to root CA.

TLS Analysis

Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.

Expiry Alerts

Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.

DV vs OV vs EV Certificates

DV (Domain Validation)
  • Confirms domain ownership only
  • Issued in minutes automatically
  • Free via Let's Encrypt
  • Suitable for most websites
  • Most common certificate type
OV / EV
  • Organization (OV) or Extended Validation (EV)
  • Issued in 1-5 business days
  • Costs $50 to $500/year
  • For finance, e-commerce, government sites
  • Increases user trust

Who uses this

DevOps

SSL certificate monitoring

Security

TLS config audit

SEO

HTTPS as ranking factor

E-commerce

customer trust

Common Mistakes

Expired certificateBrowsers block sites with expired SSL. Set up auto-renewal or monitoring.
Incomplete certificate chainWithout intermediate CA, some browsers and bots cannot verify the certificate.
Mixed content on HTTPS siteHTTP resources on an HTTPS page — the browser lock icon disappears, reducing trust.
Using TLS 1.0/1.1Legacy TLS versions have known vulnerabilities. Use TLS 1.2+ or 1.3.
Domain mismatch in certificateThe certificate must cover all site domains, including www and subdomains.

Best Practices

Set up auto-renewalLet's Encrypt + certbot with cron — certificate renews automatically every 60-90 days.
Enable HSTSStrict-Transport-Security header forces browsers to always use HTTPS.
Use TLS 1.3TLS 1.3 is faster (1-RTT handshake) and safer — legacy ciphers removed.
Monitor expiration datesCreate a monitor on Enterno.io — get notified well before expiration.
Verify chain after renewalAfter certificate renewal, confirm that intermediate certificates are installed.

Get more with a free account

SSL certificate monitoring, check history and alerts 30 days before expiry.

Sign up free

Learn more

Frequently Asked Questions

Why does ChaCha20 matter for mobile?

AES speeds up via AES-NI instructions on x86. Old ARM processors (iPhone < 6, Android < 2017) lack them — ChaCha20 runs purely in software and wins by 2-3x.

What cipher list on nginx?

Modern: <code>ssl_ciphers TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256;</code> for TLS 1.3 + <code>ECDHE-ECDSA-AES128-GCM-SHA256:...</code> for TLS 1.2.

AES-128 or AES-256?

AES-128 is enough for 99% of cases and faster. AES-256 only for compliance (PCI DSS, FIPS 140-2 L2+) or protecting 100-year secrets.

How do I check my site's cipher?

<a href="/en/ssl">Enterno SSL/TLS</a> shows the negotiated cipher + supported list. Or: <code>openssl s_client -connect example.com:443 -tls1_3</code>.