Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https.
In simple words, a HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.
What exactly is a Secure Communication?
Suppose there exists two communicating parties: Say A (client) and B (server).
Working of HTTP:
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But, imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between A and B , he can easily obtain the PASSWORDS, since they remain unencrypted. This scenario is illustrated using the following diagram:

Now let us see the working of HTTPS:
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So, even if the Hacker manages to gain an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below:

How is HTTPS implemented?
HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the site visitors to trust it. It has the following uses:
-
An SSL Certificate enables encryption of sensitive information during online transactions.
-
Each SSL Certificate contains unique and authenticated information about the certificate owner.
-
A Certificate Authority verifies the identity of the certificate owner when it is issued.
How Encryption Works?
Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So, during a secure communication, the browser encrypts the message using the public key and sends it to the server. This message is decrypted on the server side using the Private key(Secret key).
How to Identify a Secure Connection?
In the Internet Explorer and most other browser programs like Firefox or Google Chrome, you will see a lock icon
in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
So, the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of a Phishing attack using a fake login page.
I Hope you like the information presented in this article. Please pass your comments.





I am Srikanth Ramesh, a computer engineer from India.
48 Comments
Slim0123
January 27, 2009 at 5:22 PMvinod
February 19, 2009 at 3:59 PMatul
February 21, 2009 at 6:00 PMDan
March 6, 2009 at 1:14 AMnaveen
May 8, 2009 at 1:26 AMANKUR
May 15, 2009 at 2:07 PMANKUR
May 15, 2009 at 2:08 PMoogle-google
June 26, 2009 at 12:06 AMstefan
June 30, 2009 at 2:58 PMSrikanth
July 1, 2009 at 5:46 AMsumit
July 1, 2009 at 5:49 PMSrikanth
July 5, 2009 at 11:51 AMbalu
September 16, 2009 at 9:53 PMhacccccker
October 2, 2009 at 4:53 PMNidhish jain
October 3, 2009 at 8:24 PMNidhish jain
October 3, 2009 at 8:26 PMRohitash
October 5, 2009 at 1:18 PMSrikanth G
January 2, 2010 at 5:10 PMsantanu bhattacharya
February 5, 2010 at 9:06 AMvenkatesh
February 9, 2010 at 11:27 PMkushagra singh
February 15, 2010 at 7:09 PMSrikanth
February 16, 2010 at 10:29 PMSairam
March 31, 2010 at 7:41 PMSrikanth
April 18, 2010 at 6:43 PMmahes333
March 31, 2010 at 8:41 PMnitheesh
May 1, 2010 at 11:35 PMtripti
May 21, 2010 at 7:27 PMAli
May 22, 2010 at 9:47 PMSNS
June 4, 2010 at 11:13 AMSrikanth
June 4, 2010 at 3:31 PMAbhishek
June 8, 2010 at 12:52 PMSathiya
June 8, 2010 at 5:18 PMroshan
June 13, 2010 at 9:58 PMSrikanth
June 16, 2010 at 12:17 PMSrikanth
July 7, 2010 at 5:26 PMsanjaya
July 13, 2010 at 7:57 AMSankalp
July 19, 2010 at 1:25 AManil saini
July 28, 2010 at 2:40 PMajayraj
August 13, 2010 at 8:53 AMRohit Dev
August 18, 2010 at 11:09 AMpintu
September 5, 2010 at 11:37 PMakash
October 22, 2010 at 4:40 PMhitlor
November 12, 2010 at 7:12 PMJithin George
November 23, 2010 at 3:01 PMM.A.D
April 5, 2011 at 1:08 PMChan
May 19, 2011 at 7:45 PMMahesh Kadam
July 13, 2011 at 7:08 PMSrikanth
July 27, 2011 at 2:57 PM