SlideShare a Scribd company logo
Describe, in your own words, the mechanism for establishing a HTTPS connection.
Solution
HTTPS consists of communication over HTTP (Hypertext Transfer Protocol) with an encrypted
layer such as Transport Layer Security (TSL) or Secure Sockets Layer (SSL).
The connection between Client and Server using HTTPS is established by a handshake process
which has 3 main phases namely Hello, Certificate exchange and key exchange.
a) Hello-
This is the first phase where the client sends a message ClientHello which contains all the
necessary information such as various cipher suites, SSL version number etc. for the server to
connect to the client via SSL. Then the server responds with a ServerHello message which
contains similar information for client.
b) Certificate Exchange –
Once the contact is established between the Server and the Client, the server has to prove its
identity to the client using its SSL certificate. The SSL certificate contains various information
such as name of the owner, the domain it is attached to, the certificate’s public key,
certificate’s validity dates etc. The client then verifies the certificate whether it is a trusted
certificate or it is verified and trusted by one of several Certificate Authorities (CAs) which
client trusts.
c) Key Exchange –
In this phase the exchange of encryption key is happened by the client and server using a
symmetric algorithm which was already agreed during the Hello phase. The client generates a
random key for the symmetric algorithm. It then encrypts the key using an algorithm (which was
also agreed upon during the Hello phase) and the server’s public key from the SSL
certificate. Client then sends this encrypted key to the server, where it is decrypted using the
server’s private key.
Once the client and server have verified each over’s identity and have secretly agreed on a
key to symmetrically encrypt the data that they are about to send each other, then the HTTP
requests and responses can start flowing form one party to other in the form of a plaintext
message with encryption. The other party using the key decrypt is while reading.

More Related Content

PPTX
Transport Layer Security (TLS)
PPTX
The last picks
PDF
presentation2-151203145018-lva1-app6891.pdf
PDF
Understanding transport-layer_security__ssl
PPT
cryptography and network security thid.ppt
PPT
SSL Communication and Mutual Authentication
PPTX
SSL/TLS
Transport Layer Security (TLS)
The last picks
presentation2-151203145018-lva1-app6891.pdf
Understanding transport-layer_security__ssl
cryptography and network security thid.ppt
SSL Communication and Mutual Authentication
SSL/TLS

Similar to Describe- in your own words- the mechanism for establishing a HTTPS co.docx (20)

PPT
Web Security
PPT
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
PPT
ch17.ppt
PDF
Details about the SSL Certificate
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
DOCX
SSL-image
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PPT
ssl
PDF
SSL/TLS Handshake
PPT
PPT
PPTX
Certificate pinning in android applications
PPT
Unit -- 5.ppt
DOCX
Explain how SSL protocol is used to ensure the confidentiality and int.docx
PPTX
TLS/SSL - Study of Secured Communications
PPTX
SSL TLS Protocol
PPT
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
Web Security
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
ch17.ppt
Details about the SSL Certificate
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
SSL-image
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
ssl
SSL/TLS Handshake
Certificate pinning in android applications
Unit -- 5.ppt
Explain how SSL protocol is used to ensure the confidentiality and int.docx
TLS/SSL - Study of Secured Communications
SSL TLS Protocol
2 - IP Security2 - IP Security2 - IP Security2 - IP Security

More from earleanp (20)

DOCX
Create your own variant of both a hiring and a termination policy rela.docx
DOCX
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
DOCX
Describe three of the following attack types in the Operation Security.docx
DOCX
Describes the concept of ADTS and illustrates the concept with three o.docx
DOCX
Describe- manage- and install Active Directory replication- federation.docx
DOCX
Describe the process to start and restart apache on CENTOS command lin.docx
DOCX
Describe the process of creating and exporting a schedule report for t.docx
DOCX
Describe the principal technologies that have shaped contemporary tele.docx
DOCX
Describe the typical duties of a security manager that are strictly ma.docx
DOCX
Describe the four categories of international airports in the federal.docx
DOCX
Describe the major types of VPNs and technologies- protocols- and serv.docx
DOCX
Describe the different metrics that BGP can use in building a routing.docx
DOCX
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
DOCX
Describe the different types of qualitative analysis and indicate whic.docx
DOCX
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
DOCX
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
DOCX
Describe core competencies and their relationship to operations manage.docx
DOCX
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
DOCX
Describe events that led to the signing of the Homeland Security Act 2.docx
DOCX
Describe an experiment that disproved the theory of classical mechanic.docx
Create your own variant of both a hiring and a termination policy rela.docx
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
Describe three of the following attack types in the Operation Security.docx
Describes the concept of ADTS and illustrates the concept with three o.docx
Describe- manage- and install Active Directory replication- federation.docx
Describe the process to start and restart apache on CENTOS command lin.docx
Describe the process of creating and exporting a schedule report for t.docx
Describe the principal technologies that have shaped contemporary tele.docx
Describe the typical duties of a security manager that are strictly ma.docx
Describe the four categories of international airports in the federal.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the different metrics that BGP can use in building a routing.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the different types of qualitative analysis and indicate whic.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe core competencies and their relationship to operations manage.docx
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
Describe events that led to the signing of the Homeland Security Act 2.docx
Describe an experiment that disproved the theory of classical mechanic.docx

Recently uploaded (20)

PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Cell Structure & Organelles in detailed.
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Lesson notes of climatology university.
PPTX
Pharma ospi slides which help in ospi learning
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PPTX
Final Presentation General Medicine 03-08-2024.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Cell Structure & Organelles in detailed.
A systematic review of self-coping strategies used by university students to ...
Lesson notes of climatology university.
Pharma ospi slides which help in ospi learning
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
Final Presentation General Medicine 03-08-2024.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
202450812 BayCHI UCSC-SV 20250812 v17.pptx

Describe- in your own words- the mechanism for establishing a HTTPS co.docx

  • 1. Describe, in your own words, the mechanism for establishing a HTTPS connection. Solution HTTPS consists of communication over HTTP (Hypertext Transfer Protocol) with an encrypted layer such as Transport Layer Security (TSL) or Secure Sockets Layer (SSL). The connection between Client and Server using HTTPS is established by a handshake process which has 3 main phases namely Hello, Certificate exchange and key exchange. a) Hello- This is the first phase where the client sends a message ClientHello which contains all the necessary information such as various cipher suites, SSL version number etc. for the server to connect to the client via SSL. Then the server responds with a ServerHello message which contains similar information for client. b) Certificate Exchange – Once the contact is established between the Server and the Client, the server has to prove its identity to the client using its SSL certificate. The SSL certificate contains various information such as name of the owner, the domain it is attached to, the certificate’s public key, certificate’s validity dates etc. The client then verifies the certificate whether it is a trusted certificate or it is verified and trusted by one of several Certificate Authorities (CAs) which client trusts. c) Key Exchange – In this phase the exchange of encryption key is happened by the client and server using a symmetric algorithm which was already agreed during the Hello phase. The client generates a random key for the symmetric algorithm. It then encrypts the key using an algorithm (which was also agreed upon during the Hello phase) and the server’s public key from the SSL certificate. Client then sends this encrypted key to the server, where it is decrypted using the server’s private key.
  • 2. Once the client and server have verified each over’s identity and have secretly agreed on a key to symmetrically encrypt the data that they are about to send each other, then the HTTP requests and responses can start flowing form one party to other in the form of a plaintext message with encryption. The other party using the key decrypt is while reading.