What is SSL, TLS and HTTPS? (2024)

Table of Contents
# A C E K L M O P S T W FAQs

#

256-bit encryption

Process of scrambling an electronic document using an algorithm whose key is 256 bits in length. The longer the key, the stronger it is.

A

Asymmetric cryptography

Ciphers that imply a pair of two keys during the encryption and decryption processes. In the world of SSL and TLS, we call them public and private keys.

C

Certificate signing request (CSR)

Machine-readable form of a DigiCert certificate application. A CSR usually contains the public key and distinguished name of the requester.

Certificate authority (CA)

Entity authorized to issue, suspend, renew or revoke certificates under a CPS (Certification Practice Statement). CAs are identified by a distinguished name on all certificates and CRLs they issue. A CA must publicize its public key or provide a certificate from a higher-level CA attesting to the validity of its public key if it’s subordinate to a Primary Certification Authority. DigiCert is a Primary Certification Authority (PCA).

Cipher suite

A set of key exchange protocols, which includes the authentication, encryption and message authentication algorithms used within SSL protocols.

Common name (CN)

Attribute value within the distinguished name of a certificate. For SSL certificates, the common name is the DNS host name of the site to be secured. For Software Publisher Certificates, the common name is the organization name.

Connection error

Security issues preventing a secure session are flagged when a user tries to access a site.

D
Domain Validation (DV) SSL Certificates

The most basic level of SSL certificate. Only domain name ownership is validated before the certificate is issued.

E

Elliptic Curve Cryptography (ECC)

Creates encryption keys based on the idea of using points on a curve for the public/private key pair. Extremely difficult to break using the brute force methods often employed by hackers and offers a faster solution with less computing power than pure RSA chain encryption.

Encryption

Process of transforming readable (plaintext) data into an unintelligible form (ciphertext) so the original data either cannot be recovered (one-way encryption) or cannot be recovered without using an inverse decryption process (two-way encryption).

Extended Validation (EV) SSL Certificates

The most comprehensive form of secure certificate. The domain is validated and the company or organization undergoes a strict authentication process.

K

Key exchange

How users and servers securely establish a pre-master secret for a session.

L

Look beyond the lock

Our consumer education campaign about how to view high-assurance Extended Validation certificates. In order to combat the meteoric rise of phishing websites on the internet that pose as legitimate companies while using a legitimate Domain Validated certificate and therefore have the same padlock as other certificates.

M

Master secret

The key material used for a generation of encryption keys, MAC secrets and initialization vectors.

Message Authentication Code (MAC)

A one-way hash function arranged over a message and a secret.

O

Organization Validation (OV) SSL Certificates

A type of SSL certificate that validates ownership of the domain and the existence of the organization behind it.

P

Padlock

The icon found in the URL bar of most major browsers to signal a website is secured by HTTPS encryption. The padlock is only the first layer of a TLS/SSL certificate. If users click on the padlock icon, they can determine if a website has done its due diligence to keep customers safe online.

Pre-master secret

The key material used for the master secret derivation.

Public key infrastructure (PKI)

Architecture, organization, techniques, practices and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system. The PKI consists of systems that collaborate to provide and implement the public key cryptographic system, and possibly other related services.

S

Secure server

Server that protects host web pages using SSL or TLS. When a secure server is in use, the server is authenticated to the user. User information is encrypted by the web browser’s SSL protocol before being sent across the internet. Information can only be decrypted by the host site that requested it.

SAN (Subject Alternative Name) SSL certificates

Type of certificate that allows multiple domains to be secured with one SSL certificate.

SSL

Abbreviation for secure sockets layer. Protocol for web browsers and servers that allows for the authentication, encryption and decryption of data sent over the internet.

SSL certificate

Server certificate that enables authentication of the server to the user and encryption of data transferred between the server and the user.

SSL Handshake

A protocol used within SSL for the purpose of security negotiation.

Symmetric encryption

Encryption method that implies the same key is used both during the encryption and decryption processes.

T

TCP

Transmission control protocol, one of the main protocols in any network.

W

Wildcard SSL certificates

Type of certificate used to secure multiple subdomains.

What is SSL, TLS and HTTPS? (2024)

FAQs

What is SSL, TLS and HTTPS? ›

HTTPS is the practice of establishing a secure SSL/TLS protocol on an insecure HTTP connection. Before it connects with a website, your browser uses TLS to check the website's TLS or SSL certificate. TLS and SSL certificates show that a server adheres to the current security standards.

What is the difference between HTTPS and SSL and TLS? ›

HTTPS is the practice of establishing a secure SSL/TLS protocol on an insecure HTTP connection. Before it connects with a website, your browser uses TLS to check the website's TLS or SSL certificate. TLS and SSL certificates show that a server adheres to the current security standards.

What is SSL TLS used for? ›

SSL/TLS stands for secure sockets layer and transport layer security. It is a protocol or communication rule that allows computer systems to talk to each other on the internet safely. SSL/TLS certificates allow web browsers to identify and establish encrypted network connections to web sites using the SSL/TLS protocol.

Am I using TLS or SSL? ›

Enter the URL you wish to check in the browser. Right-click the page or select the Page drop-down menu, and select Properties. In the new window, look for the Connection section. This will describe the version of TLS or SSL used.

What does SSL stand for? ›

SSL: Secure Sockets Layer

SSL is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers). It prevents hackers from seeing or stealing any information transferred, including personal or financial data.

Which is more secure, SSL, TLS or HTTPS? ›

SSL cannot be used all alone for a particular website. It is combined with HTTP protocol then used for encryption. HTTPS is more secure and it is the latest version of the HTTP protocol which has been available to date. SSL is discontinued and now TLS (transport layer security) is used in its place.

Which SSL and TLS should I use? ›

Simply put, it's up to you. Most browsers will allow the use of any SSL or TLS protocol. However, credit unions and banks should use TLS 1.1 or 1.2 to ensure a protected connection. The later versions of TLS will protect encrypted codes against attacks, and keep your confidential information safe.

What is an example of SSL? ›

SSL protocol and SSL certificate

One example of sensitive data protected by SSL is financial information, such as credit card numbers. Other examples include: User login credentials. Personally identifiable information (PII).

Is SSL still used? ›

In fact, most modern web browsers no longer support SSL at all. TLS is the up-to-date encryption protocol that is still being implemented online, even though many people still refer to it as "SSL encryption." This can be a source of confusion for someone shopping for security solutions.

Is TLS only used for HTTP? ›

TLS is normally implemented on top of TCP in order to encrypt Application Layer protocols such as HTTP, FTP, SMTP and IMAP, although it can also be implemented on UDP, DCCP and SCTP as well (e.g. for VPN and SIP-based application uses).

How do you tell if TLS is being used? ›

Click on the ellipsis located on the top-right in the browser. Select More tools > Developer tools > Security. Look for the line "Connection...". This will describe the version of TLS or SSL used.

How do I know if TLS is used? ›

For Chrome
  1. Open the Developer Tools (Ctrl+Shift+I)
  2. Select the Security tab.
  3. Navigate to the WebAdmin or Cloud Client portal.
  4. Under Security, check the results for the section Connection to check which TLS protocol is used.
Sep 6, 2023

How do you know if SSL and TLS are activated? ›

How to identify if an SSL/TLS protocol is enabled/disabled
  1. Click Start or press the Windows key.
  2. In the Start menu, either in the Run box or the Search box, type regedit and press Enter. ...
  3. Navigate to follow the registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols.

What is SSL for beginners? ›

SSL (Secure Sockets Layer) is a security protocol that is used to establish an encrypted connection between a web server and a web client, such as a web browser.

Do you really need SSL? ›

Every website owner should think about bolstering their site security. Without SSL, your site visitors and customers are at higher risk of being having their data stolen. Your site security is also at risk without encryption. SSL protects website from phishing scams, data breaches, and many other threats.

Is it safe to turn off SSL? ›

SSL helps prevent a website from leaking sensitive personal or business data, such as a social security number or bank account information, to unapproved third parties. Firefox recommends that you do not turn off SSL certificates, but you may need to disable them temporarily to troubleshoot problems with the browser.

Is TLS only HTTPS? ›

TLS = Transport Layer Security. HTTP is at the application layer, above the transport layer. So yes, of course you can use TLS without HTTP.

Why was SSL renamed to TLS? ›

SSL is the direct predecessor of another protocol called TLS (Transport Layer Security). In 1999 the Internet Engineering Task Force (IETF) proposed an update to SSL. Since this update was being developed by the IETF and Netscape was no longer involved, the name was changed to TLS.

Is TLS same as 2 way SSL? ›

Two way SSL is an SSL/TLS certificate where the client and server verify each other to communicate with each other securely.

Why are SSL TLS and HTTPS necessary? ›

HTTPS uses the SSL/TLS protocol to encrypt communications so that attackers can't steal data. SSL/TLS also confirms that a website server is who it says it is, preventing impersonations.

Top Articles
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 6161

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.