官术网_书友最值得收藏!

Symmetric-key algorithms in HTTPS

Now, let's return to the world of web applications and HTTP. In general, web applications are just different pieces of software that communicate using the HTTP protocol. As mentioned earlier in the chapter, to secure HTTP and transform it to HTTPS, we will combine it with another protocol called TLS. The TLS protocol makes use of symmetric-key algorithms to encrypt HTTP data between a client and a server. In other words, the web client and the web server start their communication by agreeing on a shared encryption key (some call it a shared secret), which is then used to protect the data going back and forth between them.

The sender application uses the key to encrypt the data before sending it to the recipient application, which in turn utilizes a copy of the same key to decrypt this data. This process is the symmetric-key algorithm part of the TLS protocol.

Symmetric-key algorithms in HTTPS

This sounds all good and well, but how exactly would a web client and web server securely agree on the same encryption key before starting to use it to send encrypted data? Obviously, the web client can't just send the key in plain text to the web server and not expect the key to being captured by an unauthorized third party that can then simply decrypt any secure communication via the stolen key. The answer to that question as we mentioned earlier is that the TLS protocol relies on not one, but two types of cryptography algorithms to secure HTTP. The symmetric-key algorithms, which we have covered so far, are utilized to secure most of the communication; however, the public-key algorithms are used for the initial handshake. This is where the client and the server say hi and identify each other, then agree on an encryption key to use thereafter.

主站蜘蛛池模板: 饶阳县| 龙里县| 东乡县| 昌江| 芮城县| 台南市| 荆门市| 呼玛县| 贞丰县| 老河口市| 玛多县| 大埔县| 永和县| 三台县| 德惠市| 札达县| 饶河县| 九龙县| 河东区| 庆云县| 仁怀市| 九龙城区| 丽水市| 莱阳市| 安多县| 义马市| 江安县| 从化市| 宜都市| 利川市| 达日县| 若尔盖县| 鄂温| 安平县| 兴海县| 天柱县| 新丰县| 锡林浩特市| 双牌县| 奉节县| 铁力市|