Tech Factfile 02: HTTP vs HTTPS

Tech Factfile 02: HTTP vs HTTPS

HTTP  stands for Hypertext Transfer Protocol. It is a prescribed order and syntax that allows transfer of data such as website content and API calls. HTTPS stands for Hypertext Transfer Protocol Secure. 

HTTP requests and responses are not secured. HTTP requests are generated by the client browser as the user interacts with web properties for instance user clicks on a hyperlink. The browser sends a series of ‘HTTP GET’ requests in order to receive a response generated by the server. 

A typical HTTP request looks like this:

GET /hello.txt HTTP/1.1

User-Agent: curl/7.63.0 libcurl/7.63.0 OpenSSL/1.1.l zlib/1.2.11

Host: www.example.com

Accept-Language: en

------------------------------------------------

The problem is this information flows across the internet in plaintext as above, and anyone monitoring the session can easily read it. This is especially an issue when users submit sensitive data such as passwords, credit card numbers or form input data via a website or a web application.

When an origin server or proxy caching server receives an HTTP request, it sends back a similar response: 

HTTP/1.1 200 OK

Date: Wed, 30 Jan 2019 12:14:39 GMT

Server: Apache

Last-Modified: Mon, 28 Jan 2019 11:17:01 GMT

Accept-Ranges: bytes

Content-Length: 12

Vary: Accept-Encoding

Content-Type: text/plain

Hello World!

-------------------------------------------------

HTTPS protocols remedies this by using secure sockets Layer (TLS/SSL) certificate, which creates a secure encrypted link between the server and the browser. As a result, HTTPS is far more secure than HTTP.

In HTTPS, TLS/SSL uses a technology called public key encryption. The two keys, public and private keys, spawn new keys called session keys via the server’s SSL certificate when a user starts a connection between the server and the browser, encrypting further communication between the two devices. As such, anyone who intercepts the communications can only see a random string of characters.

HTTPS, in addition, perform explicit authentication of server identity  using a private key. When a user opens a channel with an origin server (navigates to a website), possession of the private key that matches with the public key in a website’s SSL certificate proves that the server is actually the legitimate host of the website. This helps block possible attacks such as on-path attacks, DNS hijacking, BGP hijacking and domain spoofing. 

To view or add a comment, sign in

More articles by WINSTONE OCHIENG

  • Tech Factfile 06: OOP in Python

    Object-oriented programming (OOP) is a method of structuring a program by bundling related properties and behaviors…

    1 Comment
  • Tech Factfile 05: The Shell

    What is a shell? In computing, a shell is a computer program which exposes an operating system’s services to a human…

    1 Comment
  • Tech Factfile 04: DNS

    The Domain Name System(DNS) is one of the most important internet services without which access to online content or…

  • Tech Factfile 03: Database Management Systems

    Database software is designed to create infrastructure that allows users to access, review and update particular pieces…

  • Tech Factfile 01: MVC Architecture

    The MVC Architecture was first developed by Trygve Reenskaug initially implemented as an architectural pattern for…

  • Dogma at best, Tyranny at worst: The right, the center, the left, and the end of Trumpism

    Today marks the end of Trump’s presidency, painted as chaotic, unhinged, corrupt, incompetent and grossly…

    3 Comments
  • COVID-19: Knock on Effects

    The corona virus pandemic has brought the world to a virtual standstill. Corona Virus (COVID-19) is a highly contagious…

    1 Comment
  • COVID-19: Some facts, hard realities

    The 1918 Spanish flu caused the deadliest pandemic outbreak in recorded history. It was caused by an H1N1 virus with…

    3 Comments
  • Smart Possibilities: Head first into innovative tools and high-tech novel solutions of the future

    Internet for everyone We can’t seem to live without the internet (how else would you read Smart Possibilities?), but…

  • Mapping out Kenya's Future

    East Africa's largest economy is a home country to countless global award winning sports men and women, legendary…

    4 Comments

Others also viewed

Explore content categories