Translate

Saturday 28 October 2023

How the data encrypted in https

 

How the data  encrypted in https

HTTPS encrypts data using the Transport Layer Security (TLS) protocol. TLS is a cryptographic protocol that provides secure communication over a computer network. It uses a combination of symmetric and asymmetric encryption to protect data in transit.


Symmetric encryption uses the same key to encrypt and decrypt data. This key is shared between the web browser and the web server.

Asymmetric encryption uses a pair of keys to encrypt and decrypt data. One key is public and the other key is private. The public key is used to encrypt the data and the private key is used to decrypt the data.

TLS uses asymmetric encryption to establish a secure connection between the web browser and the web server. The web server sends its public key to the web browser. The web browser then generates a random symmetric encryption key and encrypts it using the web server's public key. The web browser then sends the encrypted symmetric encryption key to the web server. The web server then decrypts the symmetric encryption key using its private key. Both the web browser and the web server can now use the symmetric encryption key to encrypt and decrypt data.

Once the secure connection is established, all data that is transferred between the web browser and the web server is encrypted using the symmetric encryption key. This makes it very difficult for attackers to intercept and read the data.

Here is an example of how HTTPS encryption works:

1.    A user visits an HTTPS website.

2.    The web browser and the web server establish a secure connection using asymmetric encryption.

3.    The web browser generates a random symmetric encryption key and encrypts it using the web server's public key.

4.    The web browser sends the encrypted symmetric encryption key to the web server.

5.    The web server decrypts the symmetric encryption key using its private key.

6.    The web browser and the web server now use the symmetric encryption key to encrypt and decrypt data.

7.    The user requests a page from the website.

8.    The web server encrypts the page using the symmetric encryption key and sends it to the web browser.

9.    The web browser decrypts the page using the symmetric encryption key and displays it to the user.

HTTPS encryption is very strong and it is very difficult for attackers to break it. This is why HTTPS is the preferred protocol for transferring sensitive data over the internet.

 

No comments:

Post a Comment

Note: only a member of this blog may post a comment.