Secure Socket LayerSecure Sockets Layer commonly abbreviated as SSL, is a typical expertise for enacting encrypted links between a browser and a web server. The enacted link makes sure that all the information that goes through the server and the browser retain their privacy and integrity features. It is a market protocol applied by multitudes of online sites in web based transactions security. The secure socket layer link can only be created with the use of a secure socket layer certificate, at the moment of choice to activate an SSL for a web based server several information regarding the identity of your website will be sought. The server then devises two separate keys for cryptology.

The two keys devised are namely the public and the private key. The private key must always retain its integrity and remain secure by all means. The public key on the other hand may not necessarily demand privacy and it is factored into the certificate signing request. The certificate signing request must then be forwarded during the process of secure socket layer certificate application. The details will then be cross examined and validated before issuance of a secure socket layer certificate as per the details provided. After this the web server of the organizations whose website was forwarded will compare the given certificate to the private key of the organization subsequently setting up an encrypted link for the client’s browsers and the organizations website.

The contents of the secure socket layer certificate are mainly the domain name, addresses, location, company name and country. Additionally, the date of expiry for the certificate must be stipulated together with the certifications firm details with regard to responsibilities.

Benefits of using secure socket layerSecure socket layer come with a comprehensive package at a cost effective price which factor in a browser compatibility of approximately ninety nine percent, email, telephone and web support, a strong security encryption of 128 bits and that it conducts a maximum validation within a short time and a great deal of warranties. The major advantages include institutional validation which offers clients a great deal of assurance for web based transactions with companies; it is a cheap approach to provide security to servers in a many server scenario, it can also be used to provide security to two separate web domains with a single certificate through the application of subject alternative names, limitless policy of issuance which permits elasticity in re-issuance of certificates when clients forget passwords, appropriate notifications with regard to certificate expiry dates which lower down the chances of non deliberate certificate expiries, it goes ahead to confirm to web users to seriously handle security via use of the site entrust seal and lastly it enables customers to serve themselves with creation of certificates which does away with the waiting periods for manual issuance of certificates.

Hypertext transfer protocol secureThis is a secure edition of the common hypertext transfer protocol; it permits safe electronic commerce activity together with web based banking. Some web browsers normally show a padlock icon to signify secure websites. Additionally, browsers may display https:// in the URL address. When customers visit websites through HTTPS the site via use of digital certificates encrypts the session.

The hypertext transfer protocol is a platform for exchanging information via the internet, it operates on a request reply mechanism that all internet parties adhere to in order for information to be transmitted easily, rapidly and easily between web servers that act as data storages and users who attempt to access the data. Hypertext transfer protocol is normally applied when surfing the web, it’s very insecure and people could eavesdrop on the data exchanges between the clients and the web servers. Due to the fact that many clients disclose vital information to the web servers which demand security so as to lock out un-authorized access. Due to this, https commonly referred to as secure http was devised to enable secured and authorized transaction.

In connections through https, signed certificates together with public keys are needed for the web server. When applying an https connection, the web server responds to original connection by donating several encryption options supported by it. The recipient client in response then chooses a connection option followed by a certificate exchange between the server and the client so as to authenticate their identities.

What follows after is the exchange of the encrypted data after making sure that they are both using a similar key then the connection is terminated. A server must contain a public key certification that factors in it key details plus key owners identity verification.

Benefits of hyper text transfer protocol secureUsability

Https majorly aids in identification of the data being transmitted. Through hypertext transfer protocol in online applications images can be distinguished from text files easily.

ConnectionlessHttps is wireless in that frequent connections are not needed when applying HTTP on online programs. This then grants you the chance to surf websites at higher speeds, which may have not been achieved if connections were to be rendered open all the time.

Security Websites that are secure begin with the prefix https rather than http the information is encrypted to maintain security for the involved parties hence security issues such as eavesdropping will be locked out thus being guaranteed data privacy.


Although https has several advantages, efficiency with regard to its online use might not be achieved because of absence of browser or server software’s. Furthermore, while https offers protection to vital data by encryption, there is need for data decryption at the destination meaning the appropriate security mechanism must be put in place at the destination to uphold data security. Hypertext transfer protocol secure is also to some extent slower.

My Observation

Some of the benefits associated to communications via computers are their capabilities to provide privacy and secrecy to its clients. Encryption has to a great extent aided message data security since it was introduced. Today cryptography has been factored into many electronic commerce applications due to its abilities to assure confidentiality, authenticity and data integrity during communications. Despite the arithmetic considerations of the techniques used to encrypt data, it has to a great deal provide vital services to web based commercial transactions. However, the application of cryptographic techniques seems to arouse suspicion among many. It is presumed that the application of secret codes is linked to the environments of spies and company espionage. In spite of that there still are many logical explanations for adoption of encryption especially with regard to financial transactions and the need to secure business dealings from non ethical beings that may intercept records then use them for fraudulent purposes. This is the main reason why encryption is now becoming the backbone of all financial systems.

ReferencesBowden, C,&AY 1999, Cryptography and Democracy: Dilemmas of Freedom, in Liberty eds., Liberating Cyberspace: Civil Liberties, Human Rights, and the Internet, Pluto Press, London.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 6-8 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now