Information Security 5 min read

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

Top Architect
Top Architect
Top Architect
Understanding HTTPS: Why It Is Secure and How It Works

Before HTTPS, all requests were sent in plaintext, making them vulnerable to eavesdropping and packet sniffing; encryption—both symmetric and asymmetric—protects data during transmission.

1. Why HTTPS is needed – HTTPS encrypts communication to prevent information leakage.

2. Symmetric encryption – Uses the same key for encryption and decryption, but without a secure way to share the key it is vulnerable.

3. Asymmetric encryption – Uses a public‑private key pair; the public key can be shared, while only the holder of the private key can decrypt, yet pure asymmetric encryption alone is also insufficient.

4. Key transmission process

HTTPS combines symmetric encryption for data and asymmetric encryption to securely exchange the symmetric key (key A), ensuring the key does not fall into attackers' hands.

5. Why HTTPS is reliable

It solves three problems: encrypted communication prevents data reconstruction; it blocks man‑in‑the‑middle attacks by using CA‑issued certificates; and certificate verification ensures the server’s authenticity.

Certificates are issued by trusted CAs, whose public keys are embedded in operating systems and browsers, guaranteeing that only certificates signed by a legitimate CA are accepted.

6. Role of keys

Each key (symmetric key A, server’s private/public keys, CA’s keys) has a specific function in establishing a secure channel, as illustrated in the final diagram.

Reference: "Web Security 3 – In‑Depth HTTPS Principles" (bilibili video).

encryptionTLSweb securityHTTPSasymmetric encryptionsymmetric encryptionpublic key infrastructure
Top Architect
Written by

Top Architect

Top Architect focuses on sharing practical architecture knowledge, covering enterprise, system, website, large‑scale distributed, and high‑availability architectures, plus architecture adjustments using internet technologies. We welcome idea‑driven, sharing‑oriented architects to exchange and learn together.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.