Tag

public key infrastructure

1 views collected around this technical thread.

Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSTLSWeb Security
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Efficient Ops
Efficient Ops
Nov 12, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)

This article walks through the design of HTTPS, showing how symmetric encryption secures data while asymmetric encryption safely negotiates keys, and explains the role of digital certificates and certificate authorities in preventing man‑in‑the‑middle attacks.

HTTPSTLScryptography
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

HTTPSTLSasymmetric encryption
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates