SlideShare a Scribd company logo
Maroti Deshmukh
12MCMB02
 Introduction to HTTP
 Limitations to HTTP
 Introduction to HTTPS
 Implementation of HTTPS
 HTTPS Encryption
 Identify secure connection
 Disadvantages of HTTPS
 HTTP vs. HTTPS
 Conclusion
 HTTP (Hypertext Transfer Protocol) is the set
of rules for transferring files (text, graphic
images, sound, video, and other multimedia
files) on the world wide web.
 HTTP uses default port 80.
 The client submits an HTTP request message
to the server. The server, which provides
resources such as HTML files and other
content, or performs other functions on
behalf of the client, returns a response
message to the client.
HTTPS

Recommended for you

Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .

This presentation is a basic insight into the Application Layer Protocols i.e. Http & Https. I was asked to do this as a part of an interview round in one of the networking company. -Kudos Harshad Taware Bangalore ,India

SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol

Brief explanation about TLS and SSL protocol handshake and message exchange process and its describe certificate validation.

certificatessl certificatessl version
SSL
SSLSSL
SSL

The document discusses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols for securing communications over a network. It explains that SSL uses certificates and keys to encrypt data between a client and server so only they can access it. It then describes the different versions of SSL, how SSL establishes encrypted connections, and provides diagrams of SSL and mutual authentication processes.

presentation
 Unsecured
 Does not use certificates
 Privacy
 Integrity
 Authentication
 HTTPS = HTTP + SSL
 HTTPS stands for Hypertext Transfer Protocol
over Secure Socket Layer, or HTTP over SSL.
 HTTPS by default uses port 443.
 URL's beginning with HTTPS indicate that the
connection is encrypted using SSL.
HTTPS
 HTTPS is implemented using Secure Sockets
Layer (SSL).
 HTTPS by purchasing an SSL Certificate.

Recommended for you

SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS

SSL and TLS provide end-to-end security for applications using TCP. They operate at the transport layer and provide services like data encryption, message integrity, and client/server authentication. The key components are the handshake protocol for negotiating encryption parameters and exchanging keys, the record protocol for fragmenting and encrypting application data, and alert and change cipher spec protocols for signaling errors and key changes. Common algorithms include RSA and Diffie-Hellman for key exchange, RC4, 3DES and AES for encryption, and MD5 or SHA for hashing. Sessions define a connection's cryptographic settings while connections are the actual data streams.

ssltlssecurity at transport layer
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...

The document defines HTTP and HTTPS. HTTP is the Hypertext Transfer Protocol that provides communication between web browsers and servers. It is unsecured and transmits data in plain text. HTTPS is HTTP secured with SSL/TLS encryption to provide security. Key differences are that HTTPS uses port 443 instead of HTTP's port 80, establishes an encrypted channel, and verifies servers with certificates to protect against attacks.

Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)

Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).

transport layer securityinternettls
 SSL certificates becomes the "passport" or the
digital document that verify that the security
and authenticity of the interaction.
 The SSL certificate is installed on a web server
to identify the business using it to encrypt
sensitive data such as credit card
information.
 SSL Certificates give a website the ability to
communicate securely with its web
customers.
 An SSL Certificate enables encryption of
sensitive information during online
transactions.
 Each SSL Certificate contains unique,
authenticated information about the
certificate owner.
 A Certificate Authority verifies the identity of
the certificate owner when it is issued.
HTTPS
 Each SSL Certificate consists of a Public key
and a Private key.
 So during a secure communication, the
browser encrypts the message using the
public key and sends it to the server. The
message is decrypted on the server side
using the Private key.

Recommended for you

HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics

HTTP is the protocol that powers the web. It uses a request-response model where clients make requests that servers respond to. Common request methods include GET, POST, HEAD, PUT, DELETE, and OPTIONS. Responses include status codes like 200 for OK and content types. HTTP 1.1 added features like persistent connections and chunked encoding. Cookies are used to maintain statelessness. HTTPS uses SSL/TLS to secure HTTP connections with encryption, server authentication, and integrity.

SSL
SSLSSL
SSL

TLS (Transport Layer Security) is a protocol that provides secure communication over the Internet by addressing issues of privacy, integrity, and authentication. It uses encryption to ensure privacy, message authentication codes to ensure integrity, and X.509 certificates to perform authentication between clients and servers. TLS is commonly used with HTTPS to secure web browsing and can also be used by other applications like email, voice over IP, and file transfer.

HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference

HTTP is a protocol for sending and receiving data between a web server and client like web browsers. It allows web pages and other files to be transferred but the data is not encrypted, so it can be viewed or intercepted by others. HTTPS encrypts this data transfer using SSL certificates to provide a secure connection and prevent sensitive information from being stolen. The main advantages of HTTPS are that it helps build trust, provides security, and qualifies websites for features like AMP pages.

httpvshttpshttpvshttps differencehttp vs https performance
 In Internet Explorer, you will see a lock icon
in the Security Status bar. The Security Status
bar is located on the right side of the Address
bar. You can click the lock to view the identity
of the website.
 If the information does not match or the
certificate has expired, the browser displays
an error message or warning and the status
bar may turn RED.
 HTTPS is slightly slower than HTTP
 HTTPS adds computational overhead as well
as network overhead.
 URL begins with “http://" in case of HTTP while
the URL begins with “https://” in case of HTTPS.
 HTTP is unsecured while HTTPS is secured.
 HTTP uses port 80 for communication while
HTTPS uses port 443 for communication.
 HTTP operates at Application Layer while HTTPS
operates at Transport Layer.
 No encryption is there in HTTP while HTTPS uses
encryption.
 No certificates required in HTTP while certificates
required in HTTPS.
 The HTTP network protocol is fundamental to
the way the World Wide Web works, and the
encryption involved in HTTPS adds an
essential layer if confidential information or
sensitive data are to be exchanged over the
public internet.

Recommended for you

TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security

TLS (Transport Layer Security) is a cryptographic protocol that provides encryption and security for data sent over the internet. It is used by HTTPS to encrypt communication between web browsers and servers. TLS 1.2, the previous standard, had security flaws in how it exchanged encryption keys. TLS 1.3 improves security by using Diffie-Hellman key exchange so keys are not sent directly over the network. To upgrade a website from HTTP to HTTPS, an SSL certificate must be purchased and installed, all links on the site must be changed to HTTPS, and HTTP traffic should be redirected to HTTPS.

technologynetworking
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP

FTP is a protocol that allows users to transfer files between computers over a TCP network using an FTP client and server. It uses ports 20 and 21, with port 20 for sending data and port 21 for control commands. FTP supports authentication but sends all data, including usernames and passwords, in clear text. TFTP is a simpler version of FTP that uses UDP port 69 and only supports sending and receiving files. It lacks many of FTP's advanced features but requires fewer resources. TFTP does not support authentication and sends all data in clear text.

cciecisco networkingsecurity
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)

The document presents an overview of Secure Socket Layer (SSL) technology. It discusses how SSL establishes encrypted connections to provide security and integrity. It describes SSL architecture including certificates, hashing, asymmetric and symmetric data transfer, and the SSL handshake process. It also covers encryption algorithms like RC4, AES, Triple DES, and RSA that are used. Finally, it discusses asymmetric key cryptography algorithms like Diffie-Hellman and RSA, as well as symmetric key cryptography and the future scope of encryption standards.

mihir trivedidwiti gajab
 Murizah Kassim1, 2, Mohamed Ismail1,
Kasmiran Jumari1 and Mat Ikram Yusuf
21Universiti Kebangsaan Malaysia
 Kefei Cheng, Meng Gao, Ruijie Guo College of
Computer Science Chongqing University of
Posts and Telecommunications Chongqing,
China
 http://www.101hacker.com
HTTPS

More Related Content

What's hot

HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
Lana Dujanovic
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali
 
Http vs Https
Http vs HttpsHttp vs Https
Http vs Https
shikherwalia
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
simplyharshad
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
Devang Badrakiya
 
SSL
SSLSSL
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
Ghanshyam Patel
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
sanjoysanyal
 
SSL
SSLSSL
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
Real Estate
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
NetProtocol Xpert
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
Http
HttpHttp
HTTP
HTTPHTTP
Basics of HTTP - Nafis Fuad
Basics of HTTP - Nafis FuadBasics of HTTP - Nafis Fuad
Basics of HTTP - Nafis Fuad
Cefalo
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Nishant Pahad
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 

What's hot (20)

HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Http vs Https
Http vs HttpsHttp vs Https
Http vs Https
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
SSL
SSLSSL
SSL
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
SSL
SSLSSL
SSL
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Http
HttpHttp
Http
 
HTTP
HTTPHTTP
HTTP
 
Basics of HTTP - Nafis Fuad
Basics of HTTP - Nafis FuadBasics of HTTP - Nafis Fuad
Basics of HTTP - Nafis Fuad
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 

Viewers also liked

Fifa 2015
Fifa 2015Fifa 2015
Fifa 2015
R.K. University
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
IJMER
 
Wt https
Wt   httpsWt   https
Wt https
vinay arora
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
CheapSSLsecurity
 
Web performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transitionWeb performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transition
seanwalbran
 
How ssl works
How ssl worksHow ssl works
How ssl works
Saptarshi Basu
 
HTTP vs HTTPS: Benefits of HTTPS and SSL
HTTP vs HTTPS: Benefits of HTTPS and SSLHTTP vs HTTPS: Benefits of HTTPS and SSL
HTTP vs HTTPS: Benefits of HTTPS and SSL
Coupons Rapid
 
Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!
Mahmoud Tantawy
 
Moving from HTTP to HTTPS
Moving from HTTP to HTTPSMoving from HTTP to HTTPS
Moving from HTTP to HTTPS
Blake Crosby
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
johnny19910916
 
HTTP
HTTPHTTP
La gestion des m��dias dans Drupal 8
La gestion des médias dans Drupal 8La gestion des médias dans Drupal 8
La gestion des médias dans Drupal 8
woprrr
 
HTTPS: All you need to know
HTTPS: All you need to knowHTTPS: All you need to know
HTTPS: All you need to know
OVHcloud
 
HTTPS, Here and Now
HTTPS, Here and NowHTTPS, Here and Now
HTTPS, Here and Now
Philippe De Ryck
 
Https
HttpsHttps
software process improvement
software process improvementsoftware process improvement
software process improvement
Mohammad Xaviar
 
Everyone Screws Up HTTPS
Everyone Screws Up HTTPSEveryone Screws Up HTTPS
Everyone Screws Up HTTPS
patrickstox
 
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
Guy Podjarny
 

Viewers also liked (18)

Fifa 2015
Fifa 2015Fifa 2015
Fifa 2015
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Wt https
Wt   httpsWt   https
Wt https
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
 
Web performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transitionWeb performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transition
 
How ssl works
How ssl worksHow ssl works
How ssl works
 
HTTP vs HTTPS: Benefits of HTTPS and SSL
HTTP vs HTTPS: Benefits of HTTPS and SSLHTTP vs HTTPS: Benefits of HTTPS and SSL
HTTP vs HTTPS: Benefits of HTTPS and SSL
 
Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!
 
Moving from HTTP to HTTPS
Moving from HTTP to HTTPSMoving from HTTP to HTTPS
Moving from HTTP to HTTPS
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
HTTP
HTTPHTTP
HTTP
 
La gestion des médias dans Drupal 8
La gestion des médias dans Drupal 8La gestion des médias dans Drupal 8
La gestion des médias dans Drupal 8
 
HTTPS: All you need to know
HTTPS: All you need to knowHTTPS: All you need to know
HTTPS: All you need to know
 
HTTPS, Here and Now
HTTPS, Here and NowHTTPS, Here and Now
HTTPS, Here and Now
 
Https
HttpsHttps
Https
 
software process improvement
software process improvementsoftware process improvement
software process improvement
 
Everyone Screws Up HTTPS
Everyone Screws Up HTTPSEveryone Screws Up HTTPS
Everyone Screws Up HTTPS
 
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
 

Similar to HTTPS

Http vs https
Http vs httpsHttp vs https
Http vs https
Gulbir Chaudhary
 
HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??
SEONetsolITSolutions
 
http,https, hypertext transfer protocol and secured
http,https, hypertext transfer protocol and securedhttp,https, hypertext transfer protocol and secured
http,https, hypertext transfer protocol and secured
sanjaykr30
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
todd401
 
HTTP.pptx...............................
HTTP.pptx...............................HTTP.pptx...............................
HTTP.pptx...............................
Halabja university - Kurdistan -Iraq
 
Safe netizens
Safe netizensSafe netizens
Safe netizens
Rohit Srivastwa
 
Shttp
ShttpShttp
HTTP & HTTPs
HTTP & HTTPsHTTP & HTTPs
HTTP & HTTPs
Ahmed Saihood
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
guestb2ed5f
 
Dn11 c u3_a9_xmm
Dn11 c u3_a9_xmmDn11 c u3_a9_xmm
Dn11 c u3_a9_xmm
Xochitl Macias Marquez
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
RapidSSLOnline.com
 
SSL-TLS HTTPS
SSL-TLS HTTPSSSL-TLS HTTPS
SSL-TLS HTTPS
Fan Jiang
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
CheapSSLUSA
 
Www and http
Www and httpWww and http
Www and http
bhargav shah
 
Lecture 6- http
Lecture  6- httpLecture  6- http
Lecture 6- http
Saman M. Almufti
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
Dr. Ramchandra Mangrulkar
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
jamesbarns729
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 

Similar to HTTPS (20)

Http vs https
Http vs httpsHttp vs https
Http vs https
 
HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??
 
http,https, hypertext transfer protocol and secured
http,https, hypertext transfer protocol and securedhttp,https, hypertext transfer protocol and secured
http,https, hypertext transfer protocol and secured
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
 
HTTP.pptx...............................
HTTP.pptx...............................HTTP.pptx...............................
HTTP.pptx...............................
 
Safe netizens
Safe netizensSafe netizens
Safe netizens
 
Shttp
ShttpShttp
Shttp
 
HTTP & HTTPs
HTTP & HTTPsHTTP & HTTPs
HTTP & HTTPs
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
 
Dn11 c u3_a9_xmm
Dn11 c u3_a9_xmmDn11 c u3_a9_xmm
Dn11 c u3_a9_xmm
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
SSL-TLS HTTPS
SSL-TLS HTTPSSSL-TLS HTTPS
SSL-TLS HTTPS
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
 
Www and http
Www and httpWww and http
Www and http
 
Lecture 6- http
Lecture  6- httpLecture  6- http
Lecture 6- http
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 

Recently uploaded

Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 

Recently uploaded (20)

Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 

HTTPS

  • 2.  Introduction to HTTP  Limitations to HTTP  Introduction to HTTPS  Implementation of HTTPS  HTTPS Encryption  Identify secure connection  Disadvantages of HTTPS  HTTP vs. HTTPS  Conclusion
  • 3.  HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the world wide web.  HTTP uses default port 80.  The client submits an HTTP request message to the server. The server, which provides resources such as HTML files and other content, or performs other functions on behalf of the client, returns a response message to the client.
  • 5.  Unsecured  Does not use certificates  Privacy  Integrity  Authentication
  • 6.  HTTPS = HTTP + SSL  HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL.  HTTPS by default uses port 443.  URL's beginning with HTTPS indicate that the connection is encrypted using SSL.
  • 8.  HTTPS is implemented using Secure Sockets Layer (SSL).  HTTPS by purchasing an SSL Certificate.
  • 9.  SSL certificates becomes the "passport" or the digital document that verify that the security and authenticity of the interaction.  The SSL certificate is installed on a web server to identify the business using it to encrypt sensitive data such as credit card information.  SSL Certificates give a website the ability to communicate securely with its web customers.
  • 10.  An SSL Certificate enables encryption of sensitive information during online transactions.  Each SSL Certificate contains unique, authenticated information about the certificate owner.  A Certificate Authority verifies the identity of the certificate owner when it is issued.
  • 12.  Each SSL Certificate consists of a Public key and a Private key.  So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key.
  • 13.  In Internet Explorer, you will see a lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.  If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
  • 14.  HTTPS is slightly slower than HTTP  HTTPS adds computational overhead as well as network overhead.
  • 15.  URL begins with “http://" in case of HTTP while the URL begins with “https://” in case of HTTPS.  HTTP is unsecured while HTTPS is secured.  HTTP uses port 80 for communication while HTTPS uses port 443 for communication.  HTTP operates at Application Layer while HTTPS operates at Transport Layer.  No encryption is there in HTTP while HTTPS uses encryption.  No certificates required in HTTP while certificates required in HTTPS.
  • 16.  The HTTP network protocol is fundamental to the way the World Wide Web works, and the encryption involved in HTTPS adds an essential layer if confidential information or sensitive data are to be exchanged over the public internet.
  • 17.  Murizah Kassim1, 2, Mohamed Ismail1, Kasmiran Jumari1 and Mat Ikram Yusuf 21Universiti Kebangsaan Malaysia  Kefei Cheng, Meng Gao, Ruijie Guo College of Computer Science Chongqing University of Posts and Telecommunications Chongqing, China  http://www.101hacker.com