CCN Case Study
CCN Case Study
SEM: 6th
Department: EXTC
DATE OF UPLOAD: 15/4/23
Abstract:
HTTPS is a commonly used protocol to secure web service communications. This research paper
would serve as the single point of reference for PKI administrators or others who are managing
web servers for their respective corporates and want to configure HTTPS for secure
communication. It also covers Web authentication and authorization and the Role of HTTP, and
HTTPS Protocol in networking mainly emphasizes the rules to communicate with the web and the
roles of different users to access web applications using HTTP and HTTPS Protocol. The Paper
also gives the difference between HTTP and HTTPS protocols, and the role they play in
Networking.
Introduction:
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer
Protocol (HTTP). It uses encryption for secure communication over a computer network and
is widely used on the Internet. In HTTPS, the communication protocol is encrypted
using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol
is therefore also referred to as HTTP over TLS or HTTP over SSL.
The principal motivations for HTTPS are authentication of the accessed website and
protection of the privacy and integrity of the exchanged data while it is in transit. It protects
against man-in-the-middle attacks, and the bidirectional block cipher encryption of
communications between a client and server protects the communications
against eavesdropping and tampering. The authentication aspect of HTTPS requires a trusted
third party to sign server-side digital certificates. This was historically an expensive operation,
which meant fully authenticated HTTPS connections were usually found only on secured
payment transaction services and other secured corporate information systems on the World
Wide Web. In 2016, a campaign by the Electronic Frontier Foundation with the support
of web browser developers led to the protocol becoming more prevalent. HTTPS is now used
more often by web users than the original, non-secure HTTP, primarily to protect page
authenticity on all types of websites, secure accounts, and keep user communications, identity,
and web browsing private.
1. The private key - this key is controlled by the owner of a website and it’s kept, as
the reader may have speculated, private. This key lives on a web server and is
used to decrypt information encrypted by the public key.
2. The public key - this key is available to everyone who wants to interact with the
server securely. Information that's encrypted by the public key can only be
decrypted by the private key.
Technically speaking, HTTPS is not a separate protocol from HTTP. It is simply using
TLS/SSL encryption over the HTTP protocol. HTTPS occurs based upon the transmission
of TLS/SSL certificates, which verify that a particular provider is who they say they are.
When a user connects to a webpage, the webpage will send over its SSL certificate which
contains the public key necessary to start the secure session. The two computers, the client
and the server, then go through a process called an SSL/TLS handshake, which is a series of
back-and-forth communications used to establish a secure connection.
HTTPS websites can also be configured for mutual authentication, in which a web browser
presents a client certificate identifying the user. Mutual authentication is useful for situations
such as remote work, where it is desirable to include multi-factor authentication, reducing the
risk of phishing or other attacks involving credential theft. For more information on
configuring client certificates in web browsers, please read this how-to.
Integrity: Each document (such as a web page, image, or JavaScript file) sent to a browser by
an HTTPS web server includes a digital signature that a web browser can use to determine
that the document has not been altered by a third party or otherwise corrupted while in transit.
The server calculates a cryptographic hash of the document's contents, including its digital
certificate, which the browser can independently calculate to prove that the document's
integrity is intact.
Taken together, these guarantees of encryption, authentication, and integrity make
HTTPS a much safer protocol for browsing and conducting business on the web than
HTTP.
The following figure illustrates the difference between communication over HTTP and
HTTPS:
To set up a server for HTTPS transactions, you will need to perform the following steps:
1. Buy an SSL certificate.
Enabling HTTPS on your website doesn't only protect the integrity of your data. HTTPS is
also a requirement for many new browser features. Not only that, but it makes your visitors
feel more secure whenever they visit your site. These are important reasons your site needs an
SSL certificate. Before you run out and look for an SSL certificate to buy, make sure you
already know where you stand with your current web host.SSL is fairly simple to set up, but
you need to follow the right procedure for your situation. If your web host already offers a
free SSL solution, then don't waste money buying a certificate.
SSL services that offer free SSL certificates often also offer paid ones. Some web hosts offer
free management of those cron jobs if you use a service like Let's Encrypt. +
Whichever option you go with, when you order a certificate you'll see a page like the one
below. Both the certificate and the key are a part of the package.
Step 2: Install Your SSL Certificate:
Most guides that describe how to install an SSL certificate will tell you that you have to have
a dedicated IP. This means purchasing a more expensive dedicated hosting plan. If you have
such a plan, and you go into your account you'll see that you have a dedicated IP associated
with it.
If you have a shared hosting plan, where multiple websites share the same server, then you
don't have a dedicated IP that goes with your URL.
Does that mean you can't install an SSL certificate without a dedicated hosting plan? No.
Thanks to a technology called Server Name Indicator (SNI), you can still install an SSL
certificate for your site.
If you have a shared hosting plan, ask your web host whether they support SNI for SSL
encryption. To install your certificate, you'll need to go into cPanel and click on SSL/TLS
Manager.
You should see various options for managing SSL certificates. To install your initial SSL
certificate for HTTPS, choose the Install option.
You'll see the option to choose the domain you'd like to install the certificate onto. Choose the
correct domain from the dropdown box. Next, paste the long encrypted certificate text that
you copied when you purchased the certificate.
Once you save, make sure to go into WordPress and refresh all caching. Also, clear your
browser cache (press Ctrl + F5). View your site again by typing the site URL with "https://"
in front of it. If all is well, you'll see the "Secure" status in front of your site URL.
Congratulations! You now have a functioning SSL certificate, and your site can be accessed
via HTTPS.
You must re-direct users from HTTP to HTTPS on the relevant pages where secure
information will be submitted. This also means that you’ll likely need to change the links to
those pages to ensure that they are HTTPS rather than HTTP.
If you do wish to ensure that people visiting specific pages will be redirected to HTTPS rather
than HTTP, it's best to force this on the server side. You can use the following piece of code at
the top of your page. It's in PHP, but you could also use another language:
Alternatively, you can also force a redirection through your .htaccess file. The following code
is an example that would redirect any user looking at their cart or the checkout page to the
HTTPS version if they are not already on it:
4. Test the HTTPS Setup:
After completing the above steps, it is important to test your HTTPS setup to ensure that it is
working correctly. You can use online tools like Qualys SSL Labs or SSL Server Test to
check the SSL configuration of your server.
Overall, setting up a server for HTTPS transactions requires obtaining and installing an
SSL/TLS certificate, configuring the web server, testing the setup, and renewing the
certificate periodically.
How would it protect you from using a public Wi-Fi connection at a local
coffee shop?
If you are on public WiFi, using HTTPS without a VPN means that some of your data will
still be vulnerable.
HTTPS encrypts the traffic between your device and a website, making it difficult for
intruders to observe the information being shared. It also provides signatures, or HTTPS
certificates, that allow you to verify that the site you are on is run by whom it claims it to be.
HTTPS has become a standard security feature for nearly all websites.
Should all web traffic be required to use HTTPS? Why, or why not?
Undertaking
We hereby submit this report as accurate to the best of my knowledge and plagiarism
report(should be below 20%) is attached along with this.