Fundamentals 7 min read

How HTTPS Affects Access Speed and User Experience

HTTPS enhances privacy and prevents traffic hijacking but introduces additional network round‑trip times and cryptographic computation, which can increase page load latency by several RTTs and tens of milliseconds, especially on first‑time connections, affecting overall user experience.

Architect
Architect
Architect
How HTTPS Affects Access Speed and User Experience

HTTPS plays a crucial role in protecting user privacy and preventing traffic hijacking, but it also introduces latency and additional CPU load on web servers.

1. Introduction

This article introduces the impact of HTTPS on user experience.

2. Impact of HTTPS on Access Speed

Before discussing optimization strategies, the article outlines two main sources of delay introduced by HTTPS: extra network round‑trip time (RTT) and cryptographic computation.

2.1 Increased Network Delay

Both HTTP and HTTPS require DNS resolution, but the article assumes DNS cache is hit and ignores DNS lookup time for the main domain.

When a user accesses a site via HTTP (e.g., http://www.baidu.com), only a TCP three‑way handshake is needed before the HTTP request can be sent, with no additional computational cost.

In contrast, an HTTPS first request may add up to seven RTTs due to steps such as TCP handshake, HTTP 302 redirect, a second TCP handshake, TLS handshake phases, CA DNS lookup, OCSP/CRL checks, and key exchange.

The article lists the detailed sequence of these steps, each typically consuming one RTT, and notes that only a tiny fraction (<0.01 %) of requests experience the full seven‑RTT penalty, depending on conditions like first‑time request, full TLS handshake, OCSP/CRL enabled, and cache misses.

HTTP first request network latency
HTTP first request network latency
HTTPS first request network latency
HTTPS first request network latency

2.2 Increased Computational Delay

Beyond network latency, HTTPS adds significant CPU overhead on both browsers and servers. Typical additional computation exceeds 30 ms on the client side (50 ms on mobile, 10 ms on PC) and about 5 ms on the server side.

Browser overhead includes RSA signature verification, RSA/ECC key exchange operations, symmetric encryption/decryption, and integrity checks.

Server overhead includes RSA private‑key decryption, ECC key generation, symmetric encryption/decryption, and integrity verification.

3. Conclusion

The series will continue with targeted optimization measures for HTTPS performance.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

WebnetworkHTTPS
Architect
Written by

Architect

Professional architect sharing high‑quality architecture insights. Topics include high‑availability, high‑performance, high‑stability architectures, big data, machine learning, Java, system and distributed architecture, AI, and practical large‑scale architecture case studies. Open to ideas‑driven architects who enjoy sharing and learning.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.