Wireless Transport Layer Security

WTLS uses similar semantics adapted for a low bandwidth mobile device.

[2] The main changes are: WTLS has been superseded in the WAP Wireless Application Protocol 2.0 standard by the End-to-end Transport Layer Security Specification.

Due to the additional power and bandwidth requirements imposed by wireless devices, only a subset of algorithms supported by TLS are viable.

[3] An incomplete list: As mentioned above the client and server negotiate the cryptographic suite.

This happens when the session is started, briefly the client sends a list of supported algorithms and the server chooses a suite, or refuses the connection.