1. HTTP
Data is transmitted in plaintext.
2. HTTPS (Hyper Text Transfer Protocol Secure)
The SSL/TLS encryption and authentication functions are integrated into the HTTP protocol. encryption is performed through the SSL/TLS protocol before information transmission. [SSL encryption requires a unique IP address, because the host lines in HTTP will also be encrypted together, the server does not know which website the response is returned to. At this time, the server decides the response based on the IP address, A primary domain name and its subdomains can share an IP address.] The received information is first decrypted by the browser and displayed. This ensures the security of online transactions. HTTPS is widely used in online transactions, payments, and downloads of sensitive information (such as emails. for example, China Merchants Bank's online banking
3. TLS and SSL protocols
A. the Transport Layer socket and Secure Socket Layer are essentially the same. They are security protocols that combine encryption and identity authentication. They aim to prevent eavesdropping, interference, and forgery of information, such as browsers, IIS, apache, Exchange Server, and other applications are supported by default.
B. TLS is developed into rfc5246, an International Standard Organization (IETF), based on SSL (launched by Netscape, the earliest browser vendor ).
C. TLS uses encryption and digital signature technologies to provide the confidentiality of End Point authentication and communication over the Internet. The encryption intensity can reach 1024 or 2048 bits.
4. HTTPS is often used on the login page, but after successful login, it will be removed from SSL as soon as possible, that is, return to HTTP, because of performance considerations, because SSL requires encryption, the intermediate cost may not seem big, but it takes a certain number of CPU cycles to execute encryption. For many websites, this may not be a problem, but it is similar to Facebook, Google, Microsoft, A large website like Twitter has thousands of clicks per second. For example, it consumes 10 times the CPU cycle, which is 10*10. You need a large number of CPU cycles to encrypt the communication, this means a 10-fold increase in the number of servers. In this way, more hardware and money are required, for example, 10 times. This is a very realistic cost problem.