• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » HTTPS : Secure Hypertext Transfer Protocol

By Abhishek Ghosh December 6, 2011 11:29 am Updated on December 6, 2011

HTTPS : Secure Hypertext Transfer Protocol

Advertisement

HTTPS is an application protocol based on HTTP, for the secure transfer of data from Hyper Text, it is the secure version of HTTP. It is used primarily by banks, online stores, and any service that requires the sending of personal data or passwords .

 

Technical Specifications of HTTPS : Secure Hypertext Transfer Protocol

 

The system that uses the?HTTPS encryption?is based on SSL / TLS to create an encrypted channel (whose encryption level depends on the remote server and the browser used by the customer) which is more suitable for sensitive data traffic versus the HTTP protocol. In this way HTTPS ensures that sensitive information (username and password usually) can not be used by an attacker who has managed to intercept the data transfer connection, because all you’ll get is an encrypted data stream that be impossible to break.

The port for this HTTPS protocol is 443. In the HTTP protocol the URLs begin with “http://” and uses the default port 80 , HTTPS URLs begin with “https://” and use port 443 by default.

Advertisement

---

HTTP is uncertain and is subject to attack it may allow an attacker to access a website accounts and confidential information. HTTPS is designed to withstand such attacks and less insecure. HTTP operates at the highest layer of the OSI Model, the Application layer, but the security protocol operates at a lower sublayer, encrypting an HTTP message prior to transmission and decrypting a message upon receipt. Strictly speaking, HTTPS is not a separate protocol, but refers the use of HTTP on a Secure Socket Layer (SSL) or a connection to Security Transport Layer (TLS).To prepare a web server that accepts HTTPS connections, the administrator must create a public key certificate for the web server. This certificate must be signed by a Certification Authority for the web browser will accept it.

https

The authority certifies that the certificate holder. The HTTPS system can also be used for authentication of customers in order to limit access to a web server to authorized users. To do this, typically the site administrator creates a certificate for each user, a certificate that is stored within your browser. Typically, this contains the name and mailing address of the authorized user and is reviewed automatically each reconnect to verify the user’s identity, potentially without ever having to enter a password. A certificate can be revoked if it has already expired, for example, when the secret private key has been compromised. Newer browsers such as Firefox , Opera , and Internet Explorer on Windows 7 implemented the Certificate Status Protocol Online (OCSP) to verify. The browser sends the serial number of the certificate or certification authority, a delegate via OCSP and authority to respond, telling the browser whether or not to consider the certificate as valid.

 

Acquiring HTTPS Certificates

 

Purchasing HTTPS certificates can cost between U.S. $ 13 to U.S. $ 1500 per year. Organizations can also be your own certification authority for HTTPS, particularly if they are responsible for establishing browsers access to their own sites (eg sites on a company intranet , or major universities).

 

Limitations of HTTPS or Secure Hypertext Transfer Protocol

 

The level of protection of HTTPS depends on the accuracy of the implementation of the web browser, the server software and encryption algorithms. HTTPS is vulnerable when applied to static content. The entire site can be indexed using a web spider and the URI of the resource can be guessed knowing only the size of the request / response. This allows an attacker to access the plaintext (static content) allowing a cryptographic attack over HTTPS connection .

Because SSL operates on HTTP, SSL servers can only strictly present a certificate to a combination of port / IP in particular. This means that in most cases is not recommended to use name-based virtual hosting with HTTPS.

 

This article on HTTPS is written by Mr. Kanai Lal Saha, who has been regularly writing excellent articles on core computing, Virtualization and Cloud Computing.

Tagged With explain secure Hyper Text Transfer Protocol , paperuri:(6959036a43a69b9b9281c46677172796) , secure hypertext transfer protocol , Which protocols are related to the secure version of the Hypertext Transfer Protocol , What year was Hypertext Transfer Protocol invented? , hyper text transfer protocol (http) and secure http (https) are the same protocol from a standpoint of passing or blocking them with a firewall true or false? , hyper text transfer protocol secure , Which protocols are related to the secure version of the Hypertext Transfer Protocol? , hyper text system that operates over the internet crossword clue , how to secure hyper text protocaol

This Article Has Been Shared 851 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to HTTPS : Secure Hypertext Transfer Protocol

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • How to Make Cloud Computing Secure ?

    How to Make Cloud Computing Secure ? Keep an eye on the provider’s choice ! Here are a few tips to check while you are in need of Secure Cloud Computing.

  • Fundamentals of Cloud Computing

    Fundamentals of Cloud Computing represents the History, Characteristics, Cloud Computing Models and Implementation of Cloud Computing in separate paragraphs.

  • Is Everything is Safe in the Cloud ?

    Is Everything is Safe in the Cloud ? We are representing here few popular systems and highlighting especially the security aspects of the Public Cloud services.

  • How to Organize Cloud Infrastructure : Lesson 2

    Every company nowadays, has essentially two basic needs that can be met through IT and the Internet – the accessibility by and speeding up the works.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. AvatarEtheredge Stimac says

    June 27, 2013 at 9:00 pm

    Thank you that thorough post! We believe it is rather genuine. Great and bad the net now is really a vital device for both businesses as well as peoplealike.

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Exploring the Benefits and Advantages of Microsoft’s Operating System March 22, 2023
  • Web Design Cookbook: Accessibility March 21, 2023
  • Online Dating: How to Find Your Match March 20, 2023
  • Web Design Cookbook: Logo March 19, 2023
  • How Starlink Internet Works March 17, 2023

About This Article

Cite this article as: Abhishek Ghosh, "HTTPS : Secure Hypertext Transfer Protocol," in The Customize Windows, December 6, 2011, March 22, 2023, https://thecustomizewindows.com/2011/12/https-secure-hypertext-transfer-protocol/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT