Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https.
In simple words, a HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a “Secure communication”.
How Secure Sockets Layer Works?
Before we understand the concept of SSL, let us first learn what a “Secure Communication” means. Suppose there exists two communicating parties: Say A (client) and B (server).
Working of HTTP:
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But, imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorized access to the ongoing communication between A and B , he can easily obtain the PASSWORDS, since they remain unencrypted. This scenario is illustrated using the following diagram:
Now let us see the working of HTTPS:
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So, even if the Hacker manages to gain an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below:
How is HTTPS implemented?
HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the site visitors to trust it. It has the following uses:
-
An SSL Certificate enables encryption of sensitive information during online transactions.
-
Each SSL Certificate contains unique and authenticated information about the certificate owner.
-
A Certificate Authority verifies the identity of the certificate owner when it is issued.
How Encryption Works?
The whole concept of Secure Sockets Layer is implemented on the basis of RSA algorithm where each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to everyone but the private key(used for decryption) is kept secret. So, during a secure communication, the browser encrypts the message using the public key and sends it to the server. This message is decrypted on the server side using the Private key(Secret key).
How to Identify a Secure Connection?
In the Internet Explorer and most other browser programs like Firefox or Google Chrome, you will see a lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
So, the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of a Phishing attack using a fake login page.
I Hope you like the information presented in this article. Please pass your comments.
Have a look at this:
How Secure Is Encryption?
So according to Murphy’s Law, with each moment that passes, the decrease in time to crack the encryption keys, goes up exponentially.
So sooner or later we feel the need of new security measures that don’t just rely on keys but can give a perfect identity to each person which cannot be faked or recreated.
some one hacked my account
But i think encryption key can also be cracked by an expert hacker.
but overall you are the best…..
Excellent post
Yah,,,, this is the very good explanetion…any one can understand & helpfull for knowledge. thanks for information.
MY ACCOUNT IS HACKED BY SOMEONE..PLZZ TELL ME HOW CAN I SAVE MY ACCONT BY GETTING HACKED BY SOMEONE..
DIS ID IS HACKED BY SOMEONE ..PLZZ TELL HOW TO HACKED PLZ
You have simplified every concept of hacking in a great way. Further suggestions and queries(in near future) will be posted to u.
master
how should i hack the encryted passwords
@ stefan
Practically it’s not possible to crack the encrypted passwords since it takes years to break the encryption.
Hello shrikant… i m new on site but i got really valuable information from ur site… It is really quite good for bigginer level comp. users also… thankx buddy.. keep going.. i subscribe my id to ur site but i m not getting update … can u tell me the reason..plz reply..
@ sumit
You need to confirm your subscription to get an update. Also we publish only 3-4 times a month and so you have to wait for the updates.
Nice post. Now i have really got cleared of what is SSL.
hello i saw ur site and navigate it all . i found it awesome.
i have more then two years experience on hacking but i still learnt some usesful infomation from your site.
thanks
at your place u’v provided the information in a very beautiful way……but just imagine it in a visual form ok…
| |
| |
| |
[ A ]–1–|———————|——————–|–2—> [ B ]
| | |
encryption | | |encryption
| | |
|
|
hacker
let it be that a hacker already passes the encryption way and crreated it own postfile(postroom) over there which controls it all the data sending from a to b. Here no encription work for a hacker but for the information sending to the B by A will be encrypted……..
ok for that type of coding for that you’ve to pay for me…..a big amount…..it just a basic outlook….
in above comment i’v made the desing through the special chaqracters in a proper arrangement but after it gonna get post it just make it in comreted format……
Thnak you this is a very useful information for me…Thanks
Very clear cut information…….
Thank U…
I LIKE IT….. CAN U SEND ME ANY LINK WHERE I CAN LEARN HACKING AS A BEGINNER.
gud one but i need to learn more of it
sir,
i read the above information.i just want to ask that if I get the encrypted password then can decrypt or solve it by a c++ program. I made a c++ program based on encryption and decryption. please reply me…..on my mail….it will be grt if u cud reply me….
thank u…
@ kushagra singh
No the encrypted password cannot be decrypted by a C++ program. Each encryption has it’s own secret key without which decryption is not possible.
Srikanth,
We have hosted site with ssl. Problem is SSL is on the name of server. But site URL is different. when we browse the site it gives a warning.
Q. Will the passwords or cardnumbers are still safe in HTTPS?
thank you in advance.
Regards,
Sairam.
@ sairam
Yes the passwords will still be safe, however since it generates a warning it creates a bad impression for your customers
i want more detalies about how many encrpted techincs algarithum r there can u tell me also wihch website is best for reading ssl information
nice xplnatn…
yaaaaa
its help me
Yeeees, I had a wide knowledge on the encryption, decryption, entruder etc but your explanation with SSL added more knowledge for me on the topic.
Thks alot!
I dont understand one thing….
How encryption is done with one key and decryption with the other…..?
winrar or other common encryption tools are wat my arguement is based on…
Clear my doubt please…
SNS
@ SNS
You need to understand the concept of RSA algorithm in order to understand SSL. Please go through RSA algorithm for clear understanding of encryption and the decryption process.
how to decode the encrypted passwords, we only get encrypted passwords and by this we can’t hack nay password
Thanks..ur post is very simple and informative.
hotmail has no ssl ?
@ roshan
Hotmail has SSL but it is not enabled by default. To use SSL type https://login.live.com/ and then login.
@ roshan
Hotmail has SSL but is not enabled by default. Just replace the http with https in your address bar and you should see the SSL in action.
Hey srikanth, Thankx for this yar….and i want some help with rar files..do you know how to unlock an encrypted file in rar?
Very helpful..
can we hack public key????
hey! shirikant i like your articles the most i read your most of the article and i got a lot of knowledge from these articles
i want to be a professional hacker
can you help me plz
i will be very thankful to you brother
I wants to be hacker…
i just understand about security…
Pls, tell me how to hack…
thanks a lot srikanth. can u teach me hacking process from beginning? i really want to learn it . i m 22222 crazy about hacking u can thinking about it . i saw a dream 2 become a hacker that why i decided take computer science but my parents not allow to take cs. but now i study with ME. u r a only one person who can teach me hacking……… please think about it and i also forget the password of gmail account [email protected] help yaaaaaaaaaaaar
your site is interesting……. i’ll like to go through the whole of it…. by the way what do you do?
Thanks man!!!
I got a lot of knowledge | thanks…
😀
SUPERB POST……….!!!
All usefull info, no bull shits….. I like it this way……!!!!
very good post………….
it iz nice……………
but i’m not getting how 2 hack……..
Please clear me that i get the encrypeted data and as they are giving me the public key i should be able to decrypt the data because as simple logic with a door u can enter as well as u can exit?
@ Mahesh Kadam
No that’s not possible. Once encrypted, you need the private key to decrypt it. I will show this with an example in my upcoming post.
Hi,Can u pls give any example program to access pwd (http unauthorized access).
Thanks & Regards,
SPS