HTTP and https

Source: Internet
Author: User

1. HTTP
Data is transmitted in plaintext.

2. HTTPS (Hyper Text Transfer Protocol Secure)

The SSL/TLS encryption and authentication functions are integrated into the HTTP protocol. encryption is performed through the SSL/TLS protocol before information transmission. [SSL encryption requires a unique IP address, because the host lines in HTTP will also be encrypted together, the server does not know which website the response is returned to. At this time, the server decides the response based on the IP address, A primary domain name and its subdomains can share an IP address.] The received information is first decrypted by the browser and displayed. This ensures the security of online transactions. HTTPS is widely used in online transactions, payments, and downloads of sensitive information (such as emails. for example, China Merchants Bank's online banking

3. TLS and SSL protocols

A. the Transport Layer socket and Secure Socket Layer are essentially the same. They are security protocols that combine encryption and identity authentication. They aim to prevent eavesdropping, interference, and forgery of information, such as browsers, IIS, apache, Exchange Server, and other applications are supported by default.

B. TLS is developed into rfc5246, an International Standard Organization (IETF), based on SSL (launched by Netscape, the earliest browser vendor ).

C. TLS uses encryption and digital signature technologies to provide the confidentiality of End Point authentication and communication over the Internet. The encryption intensity can reach 1024 or 2048 bits.

 

4. HTTPS is often used on the login page, but after successful login, it will be removed from SSL as soon as possible, that is, return to HTTP, because of performance considerations, because SSL requires encryption, the intermediate cost may not seem big, but it takes a certain number of CPU cycles to execute encryption. For many websites, this may not be a problem, but it is similar to Facebook, Google, Microsoft, A large website like Twitter has thousands of clicks per second. For example, it consumes 10 times the CPU cycle, which is 10*10. You need a large number of CPU cycles to encrypt the communication, this means a 10-fold increase in the number of servers. In this way, more hardware and money are required, for example, 10 times. This is a very realistic cost problem.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.