Secure Sockets Layer (SSL)


Secure Sockets Layer (SSL): How It Works


What Happens When a Browser Encounters SSL

> A browser attempts to connect to a website secured with SSL.

> The browser requests that the web server identify itself.

> The server sends the browser a copy of its SSL Certificate.

> The browser checks whether it trusts the SSL Certificate. If so, it sends a    message to the server.

> The server sends back a digitally signed acknowledgement to start an SSL encrypted session.

> Encrypted data is shared between the browser and the server.


Encryption Protects Data During Transmission


Web servers and web browsers rely on the Secure Sockets Layer (SSL) protocol to help users protect their data during transfer by create a uniquely encrypted channel for private communications over the public Internet. Each SSL Certificate consists of a key pair as well as verified identification information. When a web browser (or client) points to a secured website, the server shares the public key with the client to establish an encryption method and a unique session key. The client confirms that it recognizes and trusts the issuer of the SSL Certificate. This process is known as the "SSL handshake" and it begins a secure session that protects message privacy and message integrity.

Strong encryption, at 128 bits, can calculate 288 times as many combinations as 40-bit encryption. That's over a trillion times stronger. At current computing speeds, a hacker with the time, tools, and motivation to attack using brute force would require a trillion years to break into a session protected by an SGC-enabled certificate. To enable strong encryption for the most site visitors, choose an SSL Certificate that enables 128-bit minimum encryption for 99.9 percent of website visitors.


Credentials Establish Identity Online


Credentials for establishing identity are common: a driver’s license, a passport, a company badge. SSL Certificates are credentials for the online world, uniquely issued to a specific domain and web server and authenticated by the SSL Certificate provider. When a browser connects to a server, the server sends the identification information to the browser.


To view a websites’ credentials:


Click the closed padlock in a browser window

Click the trust mark (such as a Norton Secured Seal)

Look in the green address bar triggered by an Extended Validation (EV) SSL

Authentication Generates Trust in Credentials


Trust of a credential depends on confidence in the credential issuer, because the issuer vouches for the credential’s authenticity. Certificate Authorities use a variety of authentication methods to verify information provided by organizations. Symantec, the leading Certificate Authority, is well known and trusted by browser vendors because of our rigorous authentication methods and highly reliable infrastructure. Browsers extend that trust to SSL Certificates issued by Symantec.


Extend Protection beyond HTTPS


Symantec SSL Certificates offer more services to protect your site and grow your online business. Our combination of SSL, vulnerability assessment and daily website malware scanning helps you provide site visitors with a safer online experience and extend security beyond https to your public-facing web pages.

Comments

Popular posts from this blog

AntiCloud Trojan Reverse Engineering Analysis

SQL Injection: The Equal Opportunity Vulnerability