SlideShare a Scribd company logo
1 of 18
Maroti Deshmukh
12MCMB02
 Introduction to HTTP
 Limitations to HTTP
 Introduction to HTTPS
 Implementation of HTTPS
 HTTPS Encryption
 Identify secure connection
 Disadvantages of HTTPS
 HTTP vs. HTTPS
 Conclusion
 HTTP (Hypertext Transfer Protocol) is the set
of rules for transferring files (text, graphic
images, sound, video, and other multimedia
files) on the world wide web.
 HTTP uses default port 80.
 The client submits an HTTP request message
to the server. The server, which provides
resources such as HTML files and other
content, or performs other functions on
behalf of the client, returns a response
message to the client.
 Unsecured
 Does not use certificates
 Privacy
 Integrity
 Authentication
 HTTPS = HTTP + SSL
 HTTPS stands for Hypertext Transfer Protocol
over Secure Socket Layer, or HTTP over SSL.
 HTTPS by default uses port 443.
 URL's beginning with HTTPS indicate that the
connection is encrypted using SSL.
 HTTPS is implemented using Secure Sockets
Layer (SSL).
 HTTPS by purchasing an SSL Certificate.
 SSL certificates becomes the "passport" or the
digital document that verify that the security
and authenticity of the interaction.
 The SSL certificate is installed on a web server
to identify the business using it to encrypt
sensitive data such as credit card
information.
 SSL Certificates give a website the ability to
communicate securely with its web
customers.
 An SSL Certificate enables encryption of
sensitive information during online
transactions.
 Each SSL Certificate contains unique,
authenticated information about the
certificate owner.
 A Certificate Authority verifies the identity of
the certificate owner when it is issued.
 Each SSL Certificate consists of a Public key
and a Private key.
 So during a secure communication, the
browser encrypts the message using the
public key and sends it to the server. The
message is decrypted on the server side
using the Private key.
 In Internet Explorer, you will see a lock icon
in the Security Status bar. The Security Status
bar is located on the right side of the Address
bar. You can click the lock to view the identity
of the website.
 If the information does not match or the
certificate has expired, the browser displays
an error message or warning and the status
bar may turn RED.
 HTTPS is slightly slower than HTTP
 HTTPS adds computational overhead as well
as network overhead.
 URL begins with “http://" in case of HTTP while
the URL begins with “https://” in case of HTTPS.
 HTTP is unsecured while HTTPS is secured.
 HTTP uses port 80 for communication while
HTTPS uses port 443 for communication.
 HTTP operates at Application Layer while HTTPS
operates at Transport Layer.
 No encryption is there in HTTP while HTTPS uses
encryption.
 No certificates required in HTTP while certificates
required in HTTPS.
 The HTTP network protocol is fundamental to
the way the World Wide Web works, and the
encryption involved in HTTPS adds an
essential layer if confidential information or
sensitive data are to be exchanged over the
public internet.
 Murizah Kassim1, 2, Mohamed Ismail1,
Kasmiran Jumari1 and Mat Ikram Yusuf
21Universiti Kebangsaan Malaysia
 Kefei Cheng, Meng Gao, Ruijie Guo College of
Computer Science Chongqing University of
Posts and Telecommunications Chongqing,
China
 http://www.101hacker.com
HTTPS

More Related Content

What's hot

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 

What's hot (20)

Http vs Https
Http vs HttpsHttp vs Https
Http vs Https
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
 
Https
HttpsHttps
Https
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Kerberos
KerberosKerberos
Kerberos
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
SSL
SSLSSL
SSL
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Kerberos ppt
Kerberos pptKerberos ppt
Kerberos ppt
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 

Viewers also liked

Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
johnny19910916
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 

Viewers also liked (18)

Fifa 2015
Fifa 2015Fifa 2015
Fifa 2015
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Wt https
Wt   httpsWt   https
Wt https
 
Web performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transitionWeb performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transition
 
How ssl works
How ssl worksHow ssl works
How ssl works
 
HTTP vs HTTPS: Benefits of HTTPS and SSL
HTTP vs HTTPS: Benefits of HTTPS and SSLHTTP vs HTTPS: Benefits of HTTPS and SSL
HTTP vs HTTPS: Benefits of HTTPS and SSL
 
Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!
 
Moving from HTTP to HTTPS
Moving from HTTP to HTTPSMoving from HTTP to HTTPS
Moving from HTTP to HTTPS
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
HTTP
HTTPHTTP
HTTP
 
La gestion des médias dans Drupal 8
La gestion des médias dans Drupal 8La gestion des médias dans Drupal 8
La gestion des médias dans Drupal 8
 
HTTPS: All you need to know
HTTPS: All you need to knowHTTPS: All you need to know
HTTPS: All you need to know
 
HTTPS, Here and Now
HTTPS, Here and NowHTTPS, Here and Now
HTTPS, Here and Now
 
Https
HttpsHttps
Https
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
software process improvement
software process improvementsoftware process improvement
software process improvement
 
Everyone Screws Up HTTPS
Everyone Screws Up HTTPSEveryone Screws Up HTTPS
Everyone Screws Up HTTPS
 
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
 

Similar to HTTPS

Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
todd401
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
guestb2ed5f
 
SSL-TLS HTTPS
SSL-TLS HTTPSSSL-TLS HTTPS
SSL-TLS HTTPS
Fan Jiang
 

Similar to HTTPS (20)

Http vs https
Http vs httpsHttp vs https
Http vs https
 
HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
 
HTTP.pptx...............................
HTTP.pptx...............................HTTP.pptx...............................
HTTP.pptx...............................
 
Safe netizens
Safe netizensSafe netizens
Safe netizens
 
Shttp
ShttpShttp
Shttp
 
HTTP & HTTPs
HTTP & HTTPsHTTP & HTTPs
HTTP & HTTPs
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
 
Dn11 c u3_a9_xmm
Dn11 c u3_a9_xmmDn11 c u3_a9_xmm
Dn11 c u3_a9_xmm
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
SSL-TLS HTTPS
SSL-TLS HTTPSSSL-TLS HTTPS
SSL-TLS HTTPS
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
 
Www and http
Www and httpWww and http
Www and http
 
Lecture 6- http
Lecture  6- httpLecture  6- http
Lecture 6- http
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Lecture17
Lecture17Lecture17
Lecture17
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

HTTPS

  • 2.  Introduction to HTTP  Limitations to HTTP  Introduction to HTTPS  Implementation of HTTPS  HTTPS Encryption  Identify secure connection  Disadvantages of HTTPS  HTTP vs. HTTPS  Conclusion
  • 3.  HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the world wide web.  HTTP uses default port 80.  The client submits an HTTP request message to the server. The server, which provides resources such as HTML files and other content, or performs other functions on behalf of the client, returns a response message to the client.
  • 4.
  • 5.  Unsecured  Does not use certificates  Privacy  Integrity  Authentication
  • 6.  HTTPS = HTTP + SSL  HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL.  HTTPS by default uses port 443.  URL's beginning with HTTPS indicate that the connection is encrypted using SSL.
  • 7.
  • 8.  HTTPS is implemented using Secure Sockets Layer (SSL).  HTTPS by purchasing an SSL Certificate.
  • 9.  SSL certificates becomes the "passport" or the digital document that verify that the security and authenticity of the interaction.  The SSL certificate is installed on a web server to identify the business using it to encrypt sensitive data such as credit card information.  SSL Certificates give a website the ability to communicate securely with its web customers.
  • 10.  An SSL Certificate enables encryption of sensitive information during online transactions.  Each SSL Certificate contains unique, authenticated information about the certificate owner.  A Certificate Authority verifies the identity of the certificate owner when it is issued.
  • 11.
  • 12.  Each SSL Certificate consists of a Public key and a Private key.  So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key.
  • 13.  In Internet Explorer, you will see a lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.  If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
  • 14.  HTTPS is slightly slower than HTTP  HTTPS adds computational overhead as well as network overhead.
  • 15.  URL begins with “http://" in case of HTTP while the URL begins with “https://” in case of HTTPS.  HTTP is unsecured while HTTPS is secured.  HTTP uses port 80 for communication while HTTPS uses port 443 for communication.  HTTP operates at Application Layer while HTTPS operates at Transport Layer.  No encryption is there in HTTP while HTTPS uses encryption.  No certificates required in HTTP while certificates required in HTTPS.
  • 16.  The HTTP network protocol is fundamental to the way the World Wide Web works, and the encryption involved in HTTPS adds an essential layer if confidential information or sensitive data are to be exchanged over the public internet.
  • 17.  Murizah Kassim1, 2, Mohamed Ismail1, Kasmiran Jumari1 and Mat Ikram Yusuf 21Universiti Kebangsaan Malaysia  Kefei Cheng, Meng Gao, Ruijie Guo College of Computer Science Chongqing University of Posts and Telecommunications Chongqing, China  http://www.101hacker.com