A Comprehensive Analysis of the HTTPS Internet Protocol Security

Verified

Added on  2022/10/04

|13
|3604
|26
Report
AI Summary
This report provides a detailed analysis of the Hypertext Transfer Protocol Secure (HTTPS), a crucial protocol for secure communication over the internet. It begins with an introduction to network security and the increasing threat of cyberbullying, highlighting the need for protocols like HTTPS. The report explores the working of HTTPS, explaining how it utilizes encryption to secure data transmitted between devices, including the use of SSL/TLS. It details the benefits of HTTPS, such as data integrity, information security, and improved network performance, and also discusses how to obtain and implement HTTPS certificates. Furthermore, the report examines the differences between HTTP and HTTPS, the working of SSL, including symmetric and asymmetric encryption, and the role of Public Key Infrastructure (PKI). The report also covers the disadvantages of HTTPS and concludes by emphasizing the protocol's importance in ensuring secure online transactions and protecting user data from unauthorized access, making it a critical component of modern cybersecurity practices.
Document Page
Running head: Https Internet protocol 1
Hypertext Transfer protocol.
Student name
Institution
Location
Lecture’s Name
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Https internet protocol 2
Abstract
In this paper, a formal analysis of modern security protocols in computer networking is
presented. Daily advancement in technology and increased use of internet has brought in
cyberbullying, this has created the need to implement https. Https provides security of data by
ensuring that you are using a secure website. On a secure website, cyberbullying will not be
possible because all data will be encrypted and will need decryption before data is read and
edited.This paper describes how HTTP is better protocol that others in network security and also
present its drawbacks.
Document Page
Https internet protocol 2
Table of content.
Contents
Abstract............................................................................................................................................2
Table of content...............................................................................................................................2
Contents...........................................................................................................................................2
1.0 Introduction................................................................................................................................3
2.0 Hypertext Transfer protocol secure (https)................................................................................4
2.1 The working of https over the network..................................................................................4
2.2 Why Https..................................................................................................................................5
1. How to get Https............................................................................................................6
2.3 How does Secure socket layer work?....................................................................................7
2. The Real Data transfer...................................................................................................7
2.4 Pubic key infrastructure.........................................................................................................7
2.5 Importance of https................................................................................................................8
3. Differences between Http and Https.............................................................................9
2.6 Tips of knowing if you are in a secure website.....................................................................9
2.5 Disadvantages of Hypertext transfer protocol secure..........................................................10
3.0 Conclusion...............................................................................................................................10
4.0 References................................................................................................................................12
Document Page
Https internet protocol 2
1.0 Introduction
Network security is a vital area of cybersecurity because as technology advances, there is
increase in cyberbullying. This can be controlled by employing different security techniques on
the internet. Internet protocols are among these rules that ensure security and integrity of moving
data over the network, they are made in a way that they do not allow users, applications, and
servers that are not authorized to access the data in the network. Internet protocols are grouped
into different categories which include; mailing protocols and messaging protocols. Some of
these protocols are hypertext transfer protocol (Http), hypertext transfer protocol secure (Https),
Secure socket layer (SSL), Transport layer security protocol (TLS) and File transfer protocol
(FTP). Sethi & Sarangi. (2017). Each protocol has its own areas of application. It is important to
know all these protocols so as to select the best protocol to use.
2.0 Hypertext Transfer protocol secure (https).
This is the secure version of the hypertext transfer protocol. The ‘S' letter is what brings in the
security concept. The Http sends data in HTML format. It employs encryption of HTML texts
between the devices and only the devices involved can do the decryption. This protocol is
applied to the application layer to ensure that data transfer over a network is secured. Http sends
data in the form of clear text, example abc@gmail.com is sent as abc@gmail.com. In this case,
Https is employed to ensure that very critical information like money transactions from the bank
is secured. This is done through data encryption Gundamaraju, Venkatraman & Galecki. (2017).
Encryption is the process by which data is changed from a readable format to a format that its
meaning cannot be understood directly. For the user to access this information, he must decrypt
the information using a given decryption key. Anybody who doesn’t know these keys cannot
access the information. The purpose of encryption in this protocol is to ensure integrity,
confidentiality, and identity of information over the network. Some information is more
important in that the owners are afraid of getting accessed by the third party.
2.1 The working of https over the network
Https works with the features of the HTTP protocol. Http enables the client computer to access
the resources over the internet because it is a protocol that works on the world wide web
(WWW); it comes in after the cryptography layer is brought in. This layer contains SSL (Secure
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Https internet protocol 2
socket layer) and TLS (Transport Layer Security). The certificate provided by Secure Socket
Layer and the Transport Layer security is sent to the server to make sure that only the client that
sends the information to the server or the server that sends the information to the client computer
can access the information read or edit. A secure socket layer connection is brought in by
Asymmetric encryption Comer. (2018). Because it's the one that initiates communication. SSL
ensures that the following happens;
i) The client is communicating with the exact server which she intended to and not a
third party.
ii) Nobody apart from the server you are communicating to can read the information you
send to it and you are the only client who can read the information being sent to you
by the server. It ensures there is data integrity.
Immediately the connection has been brought up between the server and the client, both of them
are free to send the information. The working of the Https protocol is fully dependent on the
three protocols. These are; Secure socket layer, Transport layer security, and Hypertext transfer
protocol. All these are what make Https the best protocol.
Client computer Server
Figure 1 Client-server operation using https internet protocol
The client computer sends the certificate to the server first. The client then sends the request to
the server on what he may need in an encrypted format.
The server decrypts the request, reads it because it has a shared session certificate and responds
appropriately to the clients' requests in an encrypted format.
The client computer receives the search results from the server and decrypts it using the shared
session key.
Document Page
Https internet protocol 2
2.2 Why Https
Https makes sure that there is secure communication on the network. This is managed by
introducing encryption between the server and the browser in the application or between other
devices. Encryption will deny unauthorized users, browsers or servers.
Ensures that there is the integrity of data over the network. Data integrity is where data reliability
and accuracy are ensured. This protocol ensures that there is data integrity over the network by
employing data encryption. Therefore, in case hackers get access to the data they are unable to
change or go through the information Ray. (2018).
Information security and privacy are provided. Hypertext transfer protocol ensures this by
preventing hackers from eavesdropping the communication from the browser to the server or
from the server to the browser. This is ensured by data encryption too.
Increased performance on the network. Since encryption reduces the data size, the data transfer
will be faster. A big data file is sent for a long time as compared to a small file so long as other
factors are kept constant. Therefore, Https leads to higher performance as compared to Http
which lacks data encryption.
The future of the browser is ensured since https makes the internet safer for both the user and the
browser through information security and integrity.
The site you may be trying to access will not be indicated by the browser as not secure. This is
because SSL will have provided security since https uses SSL protocol.
1. How to get Https.
How to get the https depends on where you hosted your website. You may have hosted with
agencies or with the other hosting bodies. There are many hosting bodies the choice is for the
website owner. Ryan, Erck, McGovern, McCabe, Myers, Nobrega & Punnett. (2019). Ways of
getting https are;
The agencies will help you know how to activate their secure socket layer certificate. Once you
have known to activate the certificate, you will activate it and you will have shifted from HTTP
to https.
Document Page
Https internet protocol 2
In a case where you hosted your website with a third party, you will have to look for the secure
socket layer certificate on your own. To get this, you just need to go to the body you hosted with.
They will have to provide you the certificate free of charge. This is among the after-sale services
they offer.
WordPress provides a plugin that will help you to install the certificate. What you just need to do
is to strictly follow the installation procedure. This will only be used if you used WordPress as
the content provider for designing your website’s body.
2.3 How does Secure socket layer work?
As we had mentioned earlier that hypertext transfer protocol is used to provide security and
integrity, it is important to know how it offers these services and which algorithms are used.
The working of SSL is grouped into two; Symmetric and Asymmetric encryption. Habibi,
Munadi & Yovita. (2016, September).
i) Encryption using the public key.
This process is what is referred to us as Asymmetric cryptography. This form of encryption uses
a pair of keys that are mathematically produced. One key is shared with any user who wishes to
use the website and the other one is kept secure for cipher and decipher. The sharing of one key
is what made this process be called public-key encryption Simmons. (2019).
The secure socket layer uses this encryption method to start communication over the network.
Some of the algorithms used are; ElGamal, RSA, and DSA.
ii) Symmetric encryption
Unlike public key encryption which uses a pair of keys, symmetric cryptography uses only one
key to encrypt and decrypt information. Both user, browser and server sending this information
are supposed to have this key Poh, Chin, Yau, Choo & Mohamad. (2017) Lack of this key will
not allow you to read or edit this information. After SSL has initiated communication using
Asymmetric cryptography, it then uses Symmetric encryption using a session key. Some of the
algorithms used under this are; AES-128, AES-192, and AES-256.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Https internet protocol 2
2. The Real Data transfer.
This is done using symmetric cryptography because both the endpoints use a shared session key
which is shared. Symmetric cryptography is preferred to Asymmetric because of it easy.
2.4 Pubic key infrastructure
These are infrastructures used by a secure socket layer protocol to facilitate the success of this
communication. They are used to ensure the success of sharing information that is encrypted
over the network. Lozupone. (2018). It includes the following;
a) Certificate authority
This is the body that ensures that users, browsers, servers, and other components are
authenticated for communication to take place over the network.
b) The body that registers.
This is what specific issues the certificates to the exact user. In every system, you must be
registered for the system to know who you are. After registration is when you can request for the
certificate.
c) Secure socket layer certificate.
A filed document that has that public with any other related information to be used in
information transfer. This is the most important document that ensures that there is a security of
the client's information. Zhang, Choffnes, Dumitraş, Levin, Mislove, Schulman & Wilson.
(2018).
d) Certificate management.
It is a system that keeps, authenticates and disqualifies the SSL certificates. This system is so
important because without it the certificates could be misused. Because the certificate can expire,
be tampered with or lost, there must be a system to help manage it.
The secure socket layer and the Transport layer security works almost the same since they all
involve encryption and decryption of the information. When all these are implemented the
security of critical information is provided.
Document Page
Https internet protocol 2
2.5 Importance of https
It ensures that personal information such as bank statements is not access and read by
unauthorized users or servers. Access of this information by the hackers may lead to them
accessing the bank account of the user which is called cyberbullying. SSL has helped avoid this
because it encrypts the information. Even if the information is accessed by the hacker, they
cannot read it since they lack the decryption key to change the text into a readable format.
Polvani, Camargo & Garcia. (2016).
Google considers https of more weight than HTTP. This will help websites that use https to be
ranked higher than the HTTP website. This gives the websites an added advantage.
Hypertext transfer protocol increases business hence leading to a high-profit margin. The users
using secure commerce websites will be confident while making the payment because their
details cannot be accessed by anybody else. The website owner will not also be disturbed by the
insecurity in his website.
3. Differences between Http and Https.
Https Http
Hypertext transfer protocol secure Hypertext transfer protocol.
The information is sure because it employs
encryption logic before sending the
information hence nobody can access the
information apart from the one meant for it.
There is no privacy because anyone can
access the information and alter it. Gaimari,
Russo, Palaia, Tenore, Del Vecchio &
Romeo. (2016).
It is clear of whom you are communicating
with. This enables through the use of SSL
certificate
You are not sure of the person you are
communicating to because anybody who
understands your request can freely respond.
Ensures there is data integrity as nobody can
change or read the information even if they
gain unauthorized access
Http lacks integrity in data. This is because it
does not encrypt information giving anybody
a chance to read and edit the information.
Document Page
Https internet protocol 2
2.6 Tips of knowing if you are in a secure website
Make sure that the Https in the URL has a letter ‘S'. If it does not have it means that the website
you are in is not secure. In case the link starts with HTTP only; your information is just left to be
accessed by any person. The website owners make use of https to enhance the security of their
user's information Garais & Enaceanu. (2016).
You should look for the website security policy of the website you are currently. This policy will
show how your data is collected put in use and protected against cybercriminal. This information
will help you know if your data is secured or not.
Look for the words ‘secure' or ‘Verified'. These words are used in the websites as an indication
that the website is secure. They are what is referred to us as a trust seal because it helps build
confidence in the users.
You should be able to know the presence of malware on the website while online. A malicious
ware is any program that tries to destroy the information of the website users. Example viruses
and Trajan horses. When you have known how they appear on a website, it will be easy for you
to deal with them. No website is malware-free; therefore, this should not prevent you from
accessing the internet.
2.5 Disadvantages of Hypertext transfer protocol secure
It is a logic that everything that has advantages has disadvantages. Even though https has more
advantages, it must have some drawbacks. Marin-Garcia, Bayarri & Huerta. (2015). The cons of
this protocol include;
The speed at which a website operates may reduce due to cipher and decipher. These two
processes operate using a given algorithm. The processes may take a long time.
Producing encryption and decryption keys may be more boring and could take a long time. And
incase these keys expire; the website users will be continuously notified even if they will not be
on the website at the moment. Those pop-ups cold be so disturbing to the users hence wasting
their time.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Https internet protocol 2
3.0 Conclusion
Hypertext transfer protocol is the most preferred internet security protocol as it has more
components. It is better as compared to Http because it has all the Http properties and an added
advantage of security. The ‘S’ in the Https is what brings in the difference. As we have seen
Https uses SSL in sending information. The secure socket layer is a protocol on its own. The
difference between the is that Https has the Hypertext transfer protocol while SSL does not. All
those are advantages of Https over other protocols. All internet protocols are used at different
layers. When using any website, it is good to ensure that the website is secure, this will help you
secure your personal information. Many people do neglect this due to lack of knowledge. This
may end up costing them a lot in the long run and yet they could have prevented. Https helps in
solving this problem.
Document Page
Https internet protocol 2
4.0 References
Advantages and disadvantages. In Sixth International Conference on Lasers in
Medicine (Vol. 9670, p. 96700L). International Society for Optics and Photonics.
Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
Gaimari, G., Russo, C., Palaia, G., Tenore, G., Del Vecchio, A., & Romeo, U. (2016, March).
Photodynamic therapy in the treatment of epithelial potentially malignant disorders of the
mouth:
Garais, G. E., & Enaceanu, A. S. (2016). Open source servers and website platform security.
Journal of Information Systems & Operations Management, 503.
Gundamaraju, K., Venkatraman, S., & Galecki, P. (2017). U.S. Patent Application No.
15/460,495.
Habibi, J. A., Munadi, R., & Yovita, L. V. (2016, September). Analysis secure socket layer
protocol with heart bleed bug and distributed denial-of-service. In 2016 International
Conference on Control, Electronics, Renewable Energy and Communications
(ICCEREC) (pp. 54-59). IEEE.
Lozupone, V. (2018). Analyze encryption and public key infrastructure (PKI). International
Journal of Information Management, 38(1), 42-44.
Marin-Garcia, J. A., Bayarri, L. R., & Huerta, L. A. (2015). Protocol: Comparing advantages
and disadvantages of Rating Scales, Behavior Observation Scales and Paired Comparison
Scales for behavior assessment of competencies in workers. A systematic literature
review. WPOM, 6(2), 49-63.
Poh, G. S., Chin, J. J., Yau, W. C., Choo, K. K. R., & Mohamad, M. S. (2017). Searchable
symmetric encryption: designs and challenges. ACM Computing Surveys (CSUR), 50(3), 40.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]