ComputersProgramming

The HTTPS protocol - what is it?

HTTPS - what is it, where it is used and why do you need it at all? Security issues are relevant everywhere - including the World Wide Web. With the increase in the amount of personal data that is transmitted between sites (not least due to the development of social networks), the issue of security and confidentiality has been actively raised.

What does HTTPS mean?

What is HTTPS and how is it decrypted? If you do not use the abbreviation, you must write HyperText Transfer Protocol Secure. And to understand all the features, consider each word. HyperText is used to describe the site component for which no additional extensions or scripts are needed - text, images and tables. Transfer Protocol is a standard for transferring data between different machines, which determines what should be the starting signal, how data is designated, etc. Secure - data transmission is encrypted over SSL, which makes it difficult not only to intercept, but also to receive confidential Information (interception is only half the battle). A secure HTTPS connection, while not being hacked, turns receiving encrypted information into an uncomfortable business. Why so, will be explained further.

History of development

Initially, a secure HTTPS connection was used solely to protect valuable information (card numbers, passwords to them). The protocol was initially distributed only when interacting with banking websites or online stores. Therefore, only users of these services knew about HTTPS (what this is he is). Then began to connect to search engines and social networks, and behind them other sites were pulled up. First, only logins and passwords were encrypted, but now all information transmitted between the server and the computer is encrypted. Now, before the exchange of data with the user begins, the HTTPS connection must first be established, and then data packets with information are sent.

How is the encryption of transmitted documents?

How to encrypt a huge array of data that is transmitted between unconnected networks? When you type in an e-mail, before it reaches the recipient, it will be read by a dozen different Internet providers. And if somewhere in between them the swindler will enter - that and he too. To do this, simply open the connection. That's what happens in normal mode.

But if you use the HTTPS protocol, then it fundamentally changes the case. It can be compared with the contract between your computer and the site server, in which it is written that all data will be encrypted by a certain code, and at the same time only they know the "code word" that allows access to information. In this case, anyone who gets access to the flow of information, can not read it, because he does not have a key. Theoretically, the possibility to get acquainted with the content is, but the process of decryption of data will be extremely long (it takes years or even decades on the most powerful computers).

Features of encryption

The peculiarities of using the protocol are that for each user a separate certificate is created with its own key. A certificate from each site is downloaded to the user's browser, and the only more or less likely way to intercept the data in the future is to intercept the download of the certificate the first time you visit the site. The key length can be from 40 to 256 bits. But most modern sites use a key of 128 bits in length. The lower border can only be found in the United States, where export restrictions recently operated. Also, the peculiarities of the protocol should be attributed to the fact that on one Internet address there can be only one site, protected by this protocol. The location of several sites is possible, but requires the use of additional extensions.

Conclusion

Here is the end of the article on the HTTPS protocol. What is it is itself and where it is used, you know. Remember that your safety on the Internet is primarily in your hands. Therefore, if you see that the HTTPS is highlighted in red, wait - it is quite possible that there is some gap between you and the server that allows you to lose data. After all, you need to use HTTPS to prevent problems with data stealing, and if the protocol reports problems, it can not be ignored. Although it does not hurt to check the computer for inaccuracies such as an incorrectly displayed date.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.