La Session Ripresa riutilizzerà le specifiche di cifratura precedentemente negoziate, quindi se hai bisogno di rinegoziare un altro cifrario, avrai bisogno di un nuovo handshake. Per citare RFC 5246 sezione 7 (sottolineatura mia):
The Handshake Protocol is responsible for negotiating a session, which
consists of the following items:
...(session identifier, peer certificate, compression method)...
cipher spec: Specifies the pseudorandom function (PRF) used to generate keying
material, the bulk data encryption algorithm (such as null, AES, etc.)
and the MAC algorithm (such as HMAC-SHA1). It also defines
cryptographic attributes such as the mac_length. (See Appendix A.6
for formal definition.)
...(master secret, is resumable)...
These items are then used to create security parameters for use by the
record layer when protecting application data. Many connections can
be instantiated using the same session through the resumption feature
of the TLS Handshake Protocol.