HTTPS
Developed by | Netscape Communications Corporation |
---|
HTTPS (Hypertext Transfer Protocol Secure) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.
History[edit | edit source]
HTTPS was developed by Netscape Communications Corporation to provide authentication and encrypted communication and is widely used in Internet transactions. The protocol was first used in Netscape Navigator in 1994.
Technical Details[edit | edit source]
HTTPS uses TCP port 443 by default, unlike HTTP which uses port 80. The main motivation for HTTPS is to prevent man-in-the-middle attacks and to ensure the privacy and integrity of the exchanged data. HTTPS achieves this by using public key infrastructure (PKI) to authenticate the server and establish a secure session.
Encryption[edit | edit source]
The encryption is typically done using Transport Layer Security (TLS), which is a protocol that provides privacy and data integrity between two communicating applications. TLS is the successor to Secure Sockets Layer (SSL).
Certificates[edit | edit source]
To establish a secure connection, a website must have a digital certificate issued by a trusted certificate authority (CA). This certificate contains the public key and the identity of the website owner, which helps in establishing a secure connection.
Usage[edit | edit source]
HTTPS is used in various applications where secure communication is required. This includes online banking, e-commerce, and other sensitive transactions. It is also used in webmail and other web-based applications where user data needs to be protected.
Advantages[edit | edit source]
- **Security**: HTTPS provides a secure channel over an insecure network.
- **Data Integrity**: Data cannot be modified or corrupted during transfer without being detected.
- **Authentication**: Ensures that the website is what it claims to be.
Disadvantages[edit | edit source]
- **Performance**: The encryption and decryption process can add overhead, potentially slowing down the communication.
- **Cost**: Obtaining and maintaining a digital certificate can be costly.
See Also[edit | edit source]
- HTTP
- Transport Layer Security
- Secure Sockets Layer
- Public key infrastructure
- Certificate authority
- Man-in-the-middle attack
Related Pages[edit | edit source]
Search WikiMD
Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD
WikiMD's Wellness Encyclopedia |
Let Food Be Thy Medicine Medicine Thy Food - Hippocrates |
Translate this page: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
தமிழ்,
తెలుగు,
Urdu,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
বাংলা
European
español,
Deutsch,
français,
Greek,
português do Brasil,
polski,
română,
русский,
Nederlands,
norsk,
svenska,
suomi,
Italian
Middle Eastern & African
عربى,
Turkish,
Persian,
Hebrew,
Afrikaans,
isiZulu,
Kiswahili,
Other
Bulgarian,
Hungarian,
Czech,
Swedish,
മലയാളം,
मराठी,
ਪੰਜਾਬੀ,
ગુજરાતી,
Portuguese,
Ukrainian
WikiMD is not a substitute for professional medical advice. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.
Contributors: Prab R. Tumpati, MD