Seeing this title, many people will say with certainty that they can answer this question! It is to use HTTPS for secure transmission. Yes, it is excellent. Do you know how the underlying HTTPS ensures data security? Let’s move on to today’s topic: how HTTPS achieves secure data transmission.
HTTPS Awareness HTTPS is actually a security protocol consisting of HTTP + SSL protocols. We know that the process from when we input the URL to when the page is presented is based on the HTTP protocol. The HTTP protocol ensures the basis for our network data transmission, but the security cannot be guaranteed. The SSL protocol can solve the security problem by acting on the Http protocol. HTTPS guarantees the following three things:
HTTPS security key points:
Since HTTPS has an additional process of encrypting the public key using an asymmetric encryption algorithm, it takes longer to establish a connection than HTTP. The handshake phase ensures that the connection is secure, so subsequent data transmission can be transmitted securely. Therefore, a less time-consuming symmetric encryption algorithm can be used to encrypt and transmit messages. HTTPS deconstructed: In the above picture, we can see the role of the SSL protocol. Before understanding the SSL protocol that ensures data security, let us first understand some concepts related to data security. Encryption and decryption related concepts 1. Symmetric encryption Aliases: private key encryption, single key algorithm, traditional cryptographic algorithm. Concept: It means using the same key for encryption and decryption, so the decryption key can be deduced from the encryption key, and the encryption key can also be deduced from the decryption key. Common symmetric encryption algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), RC4, IDEA 2. Asymmetric encryption Aliases: Public Key Cryptography Concept: The public key is open to the public, and the private key is stored in the hands of both ends of the communication. The client and the encrypted public key form a key pair, and the server and the encrypted public key form another key pair. The encryption and decryption keys are paired. Limitation: The length of the encrypted content cannot exceed the length of the public key 3. Digital Abstract Alias: Digital Fingerprint Concept: The plaintext is a string of ciphertext of fixed length (128 bits) generated by a one-way hash function. 4. Digital Signature Concept: Hybrid application of asymmetric key encryption technology and digital summaries (1) Digital Signature Process
(2) Digital signature verification (information integrity) process
Finally, compare whether the digital summary A is equal to the digital summary A'. You can also use the Hash() function in reverse to restore the summary A' to get the plaintext, and compare whether the changed plaintext is consistent with the original text (both are pig). Digital signature is an encryption process, and digital signature verification is a decryption process. A digital signature involves a hash function, the receiver's public key, and the sender's [private key]. (3) Pseudocode
5. Digital Certificate In the above digital signature process, how can we ensure that the public key is trustworthy? This is the necessity of digital certificates. Digital certificates are mainly used for encryption, signature, and identity authentication. Digital certificates are issued by a certification authority (CA). CA verifies the identity of the holder before issuing the certificate and when using the certificate. It enables the client to identify whether the public key comes from a legitimate server. A certificate authority (CA) issues digital certificates that contain a public key and the identity of the owner. The matching private key is not made public but is kept secret by the end user who generates the key pair. A certificate is also a confirmation or verification by the CA that the public key contained in the certificate belongs to the individual, organization, server, or other entity named in the certificate. The CA's obligation in such a scenario is to verify the applicant's credentials so that users and relying parties can trust the information in the CA's certificate. When you visit a website using HTTPS (secure connection), the website's server will use a certificate to prove the identity of the website to the browser (such as Chrome). The public key information contained in the certificate is trustworthy. If the certificate does not exist, the certificate has been tampered with, or the certificate is invalid, the browser will prompt you in the upper left corner that the website is not secure. Signature verification chain: client <- server <- CA Contents of the digital certificate:
Public Keys and Digital Signatures After understanding these basic concepts, let's move on to today's topic: how the SSL protocol ensures secure data transmission. SSL/TLS 1. SSL (Secure Socket Layer) Use encryption technology to ensure that data cannot be stolen during network transmission. 2. TLS (Transport Layer Security) Used to provide confidentiality and data integrity between two applications. This protocol is based on the SSL3.0 protocol and can be considered as the SSL3.1 version. It just uses some more secure strategies based on SSL3.0 to make data more secure. Other protocol layers and functions are consistent with SSL. Those who are interested can learn about its differences and advantages over SSL. The role of SSL/TLS protocol:
As you can see, these are the three points where the HTTPS protocol comes into play. So, how does the SSL protocol encrypt our data for secure transmission? 3. SSL and TLS handshake process (1) The client informs the server of the security protocol version (such as TLS1.0), encryption algorithm, compression method, and random number CRandom1 that it supports; (2) The server responds for the first time and returns to the client the version of the security protocol, encryption algorithm, compression method, random number SRandom, and a digital certificate (server certificate); (3) The client verifies the certificate sent by the server. After verification, it performs the following operations:
(4) The server responds again:
After the above four steps, the client and the server have determined the key and can encrypt and transmit the message. At this point, the handshake process ends. The security of the entire handshake phase depends on whether the third random number CRandom3 can be cracked, because this random number is encrypted using the server's public key and decrypted using the server's private key; the private key is only stored on the server itself. After all the handshake phases are completed, application data can be transmitted using symmetric encryption technology. QA 1. How does the client verify the received certificate? The certificate itself tells the client how to verify the authenticity of the certificate. In other words, the certificate tells how to generate a certificate number based on the content of the certificate. After receiving the certificate, the client generates a certificate number according to the method on the certificate. If the generated certificate number is the same as the certificate number on the certificate, then the certificate is authentic. 2. The security of the public key is confirmed by the certificate, but the certificate is issued by the issuing authority. How to confirm that the issuer is trustworthy? Through the certificate chain.
It can be seen that the certificate chain is composed of multiple certificates layer by layer. The public key of the terminal certificate is used to encrypt messages for users, and the public keys in the certificates of other layers are used to decrypt the fingerprint signature of the certificate of the next layer. The root certificate of the highest layer is self-signed, that is, it is issued to itself, so the root certificate must be credible (can't you trust yourself?^^) Summarize The secure transmission of data over the network relies on the SSL protocol, and the network transmission protocol is HTTP, which constitutes the HTTPS protocol. To ensure efficient communication security between the client and the server, HTTPS must use a symmetric encryption algorithm, but the process of negotiating the symmetric encryption algorithm requires the use of an asymmetric encryption algorithm to ensure security. However, the process of directly using asymmetric encryption is not safe in itself, and there is a possibility that the middleman will tamper with the public key. Therefore, the client and the server do not directly use the public key, but use a certificate issued by a digital certificate issuing agency to ensure the security of the asymmetric encryption process itself. In this way, a symmetric encryption algorithm is negotiated through these mechanisms, and both parties use the algorithm to encrypt and decrypt data during transmission, thus solving the communication security problem between the client and the server. |
<<: 2G is shut down in many places. How can NB-IoT and Cat.1 seize the opportunity in the reshuffle?
>>: How to detect live hosts in the intranet
RAKsmart is a foreign hosting company operated by...
In the future, 5G networks are developing in the ...
Continue to share information about DiyVM. DiyVM ...
Recently, ten departments including the Ministry ...
The all-flash data center is a futuristic concept...
DediPath has launched a Cyber Monday promotion....
Number portability is an urgent need Number porta...
[[420464]] There is a magical phenomenon in this ...
[[188829]] As an application-oriented research fi...
Intranet penetration (NAT penetration) is a techn...
According to the latest "2021 Global Mobile ...
Recently, the "Inspur Network Electronic Tar...
According to foreign media, Ericsson has reached ...
5G opens the door to major technological advances...