SITE SEARCH

The HTTPS protocol - what is it?

HTTPS - what is it, where it is used and why in generalnecessary? Security issues are relevant everywhere - including the World Wide Web. With the increase in the number of personal data that are transmitted between sites (not least due to the development of social networks), the issue of security and confidentiality has been actively raised.

What does HTTPS mean?

https what is

What is HTTPS and how is it decrypted? If you do not use the abbreviation, you must write HyperText Transfer Protocol Secure. And to understand all the features, consider each word. HyperText is used to describe a site component for which no additional extensions or scripts are needed - text, images and tables. Transfer Protocol is a standard for transferring data between different machines, which determines what should be the starting signal, how data is designated, etc. Secure - data transmission is encrypted over SSL, which makes it problematic not only to intercept, but also to receive confidential information (interception is only half the battle). A secure HTTPS connection, while not being hacked, turns receiving encrypted information into an uncomfortable business. Why so, will be explained further.

History of development

secure connection https

Initially, a secure HTTPS connectionIt was used exclusively to protect valuable information (card numbers, passwords to them). The protocol was initially distributed only when interacting with banking websites or online stores. Therefore, only users of these services knew about HTTPS (which such is it). Then, search engines and social networks began to connect, and other sites were pulled up behind them. First, only logins and passwords were encrypted, but now all the information passed between the server and the computer is encrypted. Now, before the exchange of data with the user begins, the HTTPS connection must first be established, and then data packets with information are sent.

How is the encryption of transmitted documents?

use https

How to encrypt a huge array of data thatis passed between unconnected networks? When you type the message in an email, before it reaches the recipient, it can read with a dozen different Internet providers. And if somewhere in between them the swindler will be wedged - that and he too. To do this, simply open the connection. That's what happens in normal mode.

But if you use the HTTPS protocol, then thisdrastically changes the matter. It can be compared with the contract between your computer and the site server, which states that all data will be encrypted by a certain code, and at the same time only they know the "code word" allowing access to information. In this case, anyone who gets access to the flow of information, can not read it, because he does not have a key. Theoretically, there is an opportunity to get acquainted with the content, but the process of decrypting data will be extremely long (it takes years or even decades on the most powerful computers).

Features of encryption

https connection

The features of using the protocol areThe fact that for each user a separate certificate with its own key is created. The certificate from each site is loaded into the user's browser, and the only more or less likely way to intercept the data in the future is to intercept the certificate download the first time you visit the site. The key length can be from 40 to 256 bits. But most modern sites use a key of 128 bits in length. The lower border can only be found in the United States, where export restrictions have recently operated. Also, the peculiarities of the protocol should be attributed to the fact that on one Internet address can be located only one site, protected by this protocol. The location of several sites is possible, but requires the use of additional extensions.

Conclusion

Here is the end of the article on the HTTPS protocol. What it is and where it is used, you know. Remember that your safety on the Internet is primarily in your hands. Therefore, if you see that the HTTPS is highlighted in red, wait - it is quite possible that there is some gap between you and the server that allows you to lose data. After all, you need to use HTTPS to prevent problems with data stealing, and if the protocol reports problems, it can not be ignored. Although it does not hurt to check the computer for inaccuracies such as an incorrectly displayed date.

</ p>
  • Rating: