Wednesday, August 22, 2018

HTTP and HTTPS protocol language code is familiar to internet users, because on each link that refers to a website is definitely menggukannya. This code is also often on the encounter as we were about to do browsing or opening a specific Web page. We are asked to type the code at the beginning and ends with a colon and slash twins when we perform the desired Web page browsing.

HTTP (Hypertext Transfer Protocol)
Hypertext Transfer Protocol (HTTP) is an application layer network protocol that is used for distributed information systems, collaborative, and use a lot on the retrieval usage hipermedia resource connected with the links referred to with documents while that form the World Wide Web in 1990 by the British physicist Tim Berners Lee. Http is a protocol which provides a command in intercultural communication networks, i.e. networks of communication between a client computer with a web server. In this communication, computer clientmelakukan request by typing in an address or a website that you want to access. While the server is processing the request based on the protocol code in inputkan.

HTTP is called a Stateless Protocol because each command is executed independently, without any knowledge of the commands that came before. This is the main reason that it is difficult to implement a homepage that react intelligently to user input.

HTTP Session
A session transaction is a sequence of HTTP requests and responses of the network by using the HTTP protocol. An HTTP client will initiate a request. The client will be opened a koneksiTransmission Control Protocol (TCP) to a particular port contained in a host (typically port 80 or 8080). The server is listening on port 80 will be waiting for the client's request message. When receiving a request, the server sends back a status line, such as "HTTP/1.1 200 OK", and the message that would be required, error messages or other information.

Hypertext Transfer Protocol Secure (HTTPS)

Hypertext Transfer Protocol Secure (HTTPS) has the same sense with just HTTP HTTPS has advantages in the field of security functions (secure). HTTPS in discover by Netscape Communications Corporation. HTTPS using Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under HTTP application layer. HTTP in encryption and a description of the page requested by the user and the page in the restore by web server. Both of these protocols provide adequate protection from eavesdroppers, and man in the middle attacks. In general the port used is HTTPS port 443. The level of security depends on the precision in the implement on the web browser and server software and supported by the actual encoding of algorithma. Therefore, HTTPS is used on a web page, and the URL that was used starting with 'https://'.

HTTPS can guarantee security in the Authentication server yaitumemungkinkan the browser and the user have the belief that they were talking to the real application server. HTTPS also capable in maintaining data integrity and data confidentiality.

The Main Difference Of HTTP And HTTPS

Some of the main differences between http and https, the default port, starting with an 80 for http and 443 for https. HTTPS works by transmitting normal http interaction through an encrypted system, so in theory, the information is not accessible to parties other than the client and server end. There are two general types of encryption layer: the Transport Layer Security (TLS) and Secure Socket Layer (SSL), both of which encode the data records that are exchanged.

Way Of Working

HTTPS is not a separate protocol, but refers to the combination of a normal HTTP interaction through the Socket Layer encrypted SSL (Secure) or Transport Layer Security (TLS) transport mechanisms. This ensures reasonable protection from tappers and (provided that it is implemented properly and top-level certification authorities do their job well) attacks.

The default TCP port https: URL is 443 (unsecured HTTP to, default is 80). To prepare a Web-servers for https connections on the receiver should be as administrator and create a public key certificate for the web server. These certificates can be created for Linux-based servers with tools such as Open ssl or SSL SuSE gensslcert. This certificate must be signed by a certificate authority of one form or another, to the effect that the holder of the certificate is who they claim to be. Web browsers are generally distributed with the signing certificates of major certificate authorities, so that they can verify certificates signed by them.

When you use https connection, the server responds to the initial connections by offering a list of methods of encryption support. In response, the client choosing a connection method, and the client and server Exchange certificates to authenticate their identity. Once this is done, the two sides exchanged the encrypted information after ensuring that both use the same key, and the connection is closed. Https connection to host, the server must have a public key certificate, which embeds information key with the key owner verifies the identity of it. Most certificates are verified by a third party so that the client is convinced that the key is secured.

The Advantage Of Changing The HTTP Become HTTPS?

To secure communication between a browser with the web server. How can that be? The following brief illustration will answer it: when you access a web server using the HTTPS protocol, page sent to you encrypted it used to by this Protocol. And all information that you submit to the server (registration, identity, pin number, transfer payments) will be encrypted as well so there is no yg can steal hear (eavesdropping) your data while the transaction process is underway. Then your data transactions become more safe. HTTPS protocol you can find on sites of banking, ecommerce, registration form, etc. Because this is the business area's vulnerable once happened eavesdropping by a third party. For that you need an SSL certificate.