SlideShare a Scribd company logo
1 of 23
Miracle Software Systems, Inc.




   HYPERTEXT TRANSFER
     PROTOCOL SECURE

   By

   Bhaskararao VB
Agenda


    History

    Overview

    Browser Integration

    Difference from HTTP

    Network layers

    Server setup

    Acquiring Certificates

    Conclusion
History



    Netscape Communications created HTTPS in
    1994 for its Netscape Navigator web browser.


    Originally, HTTPS was used with SSL protocol. As
    SSL evolved into Transport Layer Security (TLS),
    the current version of HTTPS was formally
    specified by RFC 2818 in May 2000.
Continue

           HTTP Coined by




             Ted Nelson
Overview

    Hypertext Transfer Protocol Secure (HTTPS) is a
    widely used communications protocol for secure
    communication over a computer network, with
    especially wide deployment on the Internet.


    HTTPS provides authentication of the web site and
    associated web server that one is communicating
    with, which protects against
    Man-in-the-middle attacks.
Continue



     Additionally, it provides bidirectional encryption of
    communications between a client and server,
    which protects against eavesdropping and
    tampering with and/or forging the contents of the
    communication.


    HTTPS connections were primarily used for
    payment transactions on the World Wide Web, e-
    mail and for sensitive transactions in corporate
    information systems.
Continue



    HTTPS began to see widespread use for
    protecting page authenticity on all types of
    websites, securing accounts and keeping user
    communications, identity and web browsing
    private.


    HTTPS is especially important over unencrypted
    networks such as WiFi as anyone on the same
    local network can do packet sniffing and discover
    sensitive information.
Continue





     As on 2012-06-22 only 12.3% of the Internet's
     186821 most popular web sites have a secure
     implementation of HTTPS. This leaves 87.7%
     (163776) open to some attacks.


     This survey is powered by Qualys’ SSL Server
    Test, in which anyone can audit the HTTPS
    implementation of a specified web server.
Continue
Continue





    The main idea of HTTPS is to create a secure
    channel over an insecure network.


    This ensures reasonable protection from
    eavesdroppers and man-in-the-middle attacks,
    provided that adequate cipher suites are used and
    that the server certificate is verified and trusted.
Browser Integration




    Most browsers display a warning if they receive an
    invalid certificate.


    Older browsers, when connecting to a site with an
    invalid certificate, would present the user with a
    dialog box asking if they wanted to continue.
Continue





     Newer browsers display a warning across the
     entire window.


     Most browsers also display a warning to the user
     when visiting a site that contains a mixture of
     encrypted and unencrypted content.
Difference from HTTP



    HTTPS URLs begin with "https://" and use port
    443 by default, whereas HTTP URLs begin with
    http:// and use port 80 by default.


    HTTP is insecure and is subject to man-in-the-
    middle and eavesdropping attacks, which can let
    attackers gain access to website accounts and
    sensitive information.
Continue





    HTTPS is designed to withstand such attacks
    and is considered secure against such attacks .
Network layers


    HTTP operates at the highest layer of the
    OSI Model, the Application layer; but the security
    protocol operates at a lower sublayer, encrypting
    an HTTP message prior to transmission and
    decrypting a message upon arrival.


    Strictly speaking, HTTPS is not a separate
    protocol, but refers to use of ordinary HTTP over
    an encrypted SSL/TLS connection.
Continue





    Everything in the HTTPS message is encrypted,
    including the headers, and the request/response
    load.
Server setup



    To prepare a web server to accept HTTPS
    connections, the administrator must create a
    public key certificate for the web server.


    This certificate must be signed by a trusted
    certificate authority for the web browser to accept it
    without warning.
Acquiring certificates


    Authoritatively signed certificates may be free or
    cost between US$8 and $1,500 per year.


    However, in the case of free certificate authorities
    such as CACert, popular browsers (e.g. Firefox,
    Chrome, Internet Explorer) may not include the
    trusted root certificates, which may cause
    untrusted warning messages to be displayed to
    end users.
Continue



 Organizations may also run their own certificate
authority, particularly if they are responsible for setting
up browsers to access their own sites (for example,
sites on a company intranet, or major universities).


 They can easily add copies of their own signing
certificate to the trusted certificates distributed with
the browser.
Conclusion



    Finally I concluded that HTTPS is the security
    Protocol over HTTP where HTTPS authenticates
    the user as well as checks the certificates.


    And it doesn’t entered the man-in-the-middle attack
    or hackers who disturbs the original data.
References


    Www.wikipedia.com

    Trustworthy Internet Movement.
    https://www.trustworthyinternet.org/ssl-pulse/.

    HTTPS Everywhere EFF projects .

    Lawrence, Eric (31 January 2006). "HTTPS
    Security Improvements in Internet Explorer 7“.

    Myers, M; Ankney, R; Malpani, A; Galperin, S;
    Adams, C (June 1999). “Online Certificate Status
    Protocol – OCSP. Internet Engineering Task
    Force.
Queries
Thank You

More Related Content

What's hot

Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
Https presentation
Https presentationHttps presentation
Https presentationpatel jatin
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)amanchaurasia
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Samip jain
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshellFrank Kelly
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Web services security
Web services securityWeb services security
Web services securitynurmeen1
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 

What's hot (20)

Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Https presentation
Https presentationHttps presentation
Https presentation
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
HTTP & HTTPS
HTTP & HTTPSHTTP & HTTPS
HTTP & HTTPS
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Http protocol
Http protocolHttp protocol
Http protocol
 
Https
HttpsHttps
Https
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Web services security
Web services securityWeb services security
Web services security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Viewers also liked

HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupJason Stangroome
 
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentationbryanpsu
 
Secure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified DemoSecure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified DemoBrent Faulk
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.Halah Salih
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?NeoCertified
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking Salman Memon
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Sandeep Gupta
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 

Viewers also liked (18)

7 Protocols
7 Protocols7 Protocols
7 Protocols
 
HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User Group
 
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentation
 
Shttp
ShttpShttp
Shttp
 
Secure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified DemoSecure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified Demo
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
 
Https
HttpsHttps
Https
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 

Similar to Https

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationRapidSSLOnline.com
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxtodd401
 
Unit 5 -Intro to IT.pptx
Unit 5 -Intro to IT.pptxUnit 5 -Intro to IT.pptx
Unit 5 -Intro to IT.pptxNishaRohit6
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3Gurpreet singh
 
Web programming lec#3
Web programming lec#3Web programming lec#3
Web programming lec#3Nisa Soomro
 

Similar to Https (20)

Dn11 c u3_a9_xmm
Dn11 c u3_a9_xmmDn11 c u3_a9_xmm
Dn11 c u3_a9_xmm
 
Http vs https
Http vs httpsHttp vs https
Http vs https
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
HTTP.pptx...............................
HTTP.pptx...............................HTTP.pptx...............................
HTTP.pptx...............................
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
OMB M 15-13, Policy to Require Secure Connections across Federal Websites and...
OMB M 15-13, Policy to Require Secure Connections across Federal Websites and...OMB M 15-13, Policy to Require Secure Connections across Federal Websites and...
OMB M 15-13, Policy to Require Secure Connections across Federal Websites and...
 
Web security
Web securityWeb security
Web security
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
Www and http
Www and httpWww and http
Www and http
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
 
Unit 5 -Intro to IT.pptx
Unit 5 -Intro to IT.pptxUnit 5 -Intro to IT.pptx
Unit 5 -Intro to IT.pptx
 
Lec 2.pptx
Lec 2.pptxLec 2.pptx
Lec 2.pptx
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Https interception
Https interceptionHttps interception
Https interception
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
HTTPS
HTTPSHTTPS
HTTPS
 
Web programming lec#3
Web programming lec#3Web programming lec#3
Web programming lec#3
 
HTTP & HTTPs
HTTP & HTTPsHTTP & HTTPs
HTTP & HTTPs
 

Https

  • 1. Miracle Software Systems, Inc. HYPERTEXT TRANSFER PROTOCOL SECURE By Bhaskararao VB
  • 2. Agenda  History  Overview  Browser Integration  Difference from HTTP  Network layers  Server setup  Acquiring Certificates  Conclusion
  • 3. History  Netscape Communications created HTTPS in 1994 for its Netscape Navigator web browser.  Originally, HTTPS was used with SSL protocol. As SSL evolved into Transport Layer Security (TLS), the current version of HTTPS was formally specified by RFC 2818 in May 2000.
  • 4. Continue HTTP Coined by Ted Nelson
  • 5. Overview  Hypertext Transfer Protocol Secure (HTTPS) is a widely used communications protocol for secure communication over a computer network, with especially wide deployment on the Internet.  HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks.
  • 6. Continue  Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.  HTTPS connections were primarily used for payment transactions on the World Wide Web, e- mail and for sensitive transactions in corporate information systems.
  • 7. Continue  HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and web browsing private.  HTTPS is especially important over unencrypted networks such as WiFi as anyone on the same local network can do packet sniffing and discover sensitive information.
  • 8. Continue  As on 2012-06-22 only 12.3% of the Internet's 186821 most popular web sites have a secure implementation of HTTPS. This leaves 87.7% (163776) open to some attacks.  This survey is powered by Qualys’ SSL Server Test, in which anyone can audit the HTTPS implementation of a specified web server.
  • 10. Continue  The main idea of HTTPS is to create a secure channel over an insecure network.  This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.
  • 11. Browser Integration  Most browsers display a warning if they receive an invalid certificate.  Older browsers, when connecting to a site with an invalid certificate, would present the user with a dialog box asking if they wanted to continue.
  • 12. Continue  Newer browsers display a warning across the entire window.  Most browsers also display a warning to the user when visiting a site that contains a mixture of encrypted and unencrypted content.
  • 13. Difference from HTTP  HTTPS URLs begin with "https://" and use port 443 by default, whereas HTTP URLs begin with http:// and use port 80 by default.  HTTP is insecure and is subject to man-in-the- middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information.
  • 14. Continue  HTTPS is designed to withstand such attacks and is considered secure against such attacks .
  • 15. Network layers  HTTP operates at the highest layer of the OSI Model, the Application layer; but the security protocol operates at a lower sublayer, encrypting an HTTP message prior to transmission and decrypting a message upon arrival.  Strictly speaking, HTTPS is not a separate protocol, but refers to use of ordinary HTTP over an encrypted SSL/TLS connection.
  • 16. Continue  Everything in the HTTPS message is encrypted, including the headers, and the request/response load.
  • 17. Server setup  To prepare a web server to accept HTTPS connections, the administrator must create a public key certificate for the web server.  This certificate must be signed by a trusted certificate authority for the web browser to accept it without warning.
  • 18. Acquiring certificates  Authoritatively signed certificates may be free or cost between US$8 and $1,500 per year.  However, in the case of free certificate authorities such as CACert, popular browsers (e.g. Firefox, Chrome, Internet Explorer) may not include the trusted root certificates, which may cause untrusted warning messages to be displayed to end users.
  • 19. Continue  Organizations may also run their own certificate authority, particularly if they are responsible for setting up browsers to access their own sites (for example, sites on a company intranet, or major universities).  They can easily add copies of their own signing certificate to the trusted certificates distributed with the browser.
  • 20. Conclusion  Finally I concluded that HTTPS is the security Protocol over HTTP where HTTPS authenticates the user as well as checks the certificates.  And it doesn’t entered the man-in-the-middle attack or hackers who disturbs the original data.
  • 21. References  Www.wikipedia.com  Trustworthy Internet Movement. https://www.trustworthyinternet.org/ssl-pulse/.  HTTPS Everywhere EFF projects .  Lawrence, Eric (31 January 2006). "HTTPS Security Improvements in Internet Explorer 7“.  Myers, M; Ankney, R; Malpani, A; Galperin, S; Adams, C (June 1999). “Online Certificate Status Protocol – OCSP. Internet Engineering Task Force.