Tagged articles
17 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Mar 2, 2026 · Information Security

Why HTTPS Beats HTTP: Encryption, Certificates, and TLS Handshake Explained

This article explains why HTTP is insecure—prone to eavesdropping, tampering, and identity spoofing—and how HTTPS uses symmetric and asymmetric encryption, hash functions, digital certificates, and a four‑step SSL/TLS handshake to provide confidentiality, integrity, and authentication for web traffic.

HTTPSSSL handshakeTLS
0 likes · 17 min read
Why HTTPS Beats HTTP: Encryption, Certificates, and TLS Handshake Explained
Java Tech Enthusiast
Java Tech Enthusiast
Feb 14, 2025 · Information Security

Electronic Signature Implementation Using Java and PDF

This tutorial explains China’s electronic‑seal regulations, shows how to generate a CA‑based X.509 certificate and a custom seal image with BouncyCastle, and demonstrates signing a PDF in Java using iText 5 to embed a visible seal and a verifiable digital signature.

BouncyCastlePDFdigital certificate
0 likes · 16 min read
Electronic Signature Implementation Using Java and PDF
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityHTTPSTLS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
macrozheng
macrozheng
Dec 18, 2020 · Information Security

How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates

This article explains why HTTP is insecure, outlines the four core principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and signatures to establish confidentiality, integrity, authentication, and non-repudiation for safe data transmission.

HTTPSTLScryptography
0 likes · 15 min read
How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 8, 2020 · Information Security

Understanding HTTPS: How Secure Communication Is Achieved Over HTTP

This article explains why plain HTTP is insecure, outlines the four fundamental principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and digital signatures to establish confidentiality, integrity, authentication, and non-repudiation for web traffic.

HTTPSTLSdigital certificate
0 likes · 13 min read
Understanding HTTPS: How Secure Communication Is Achieved Over HTTP
Programmer DD
Programmer DD
Nov 16, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Deep Dive

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security concepts that protect client‑server communication.

HTTPSPublic Key InfrastructureTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Deep Dive
21CTO
21CTO
May 9, 2019 · Information Security

Why HTTPS Matters: Encryption, Certificates, and Handshake Explained

HTTPS secures web communication by combining symmetric and asymmetric encryption, digital certificates, and signatures, addressing HTTP’s confidentiality, integrity, and authenticity flaws; the article explains these cryptographic concepts, the SSL/TLS handshake steps, and when HTTPS is appropriate despite its performance overhead.

HTTPSTLSWeb Security
0 likes · 12 min read
Why HTTPS Matters: Encryption, Certificates, and Handshake Explained
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

HTTPSPublic Key InfrastructureTLS
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates
21CTO
21CTO
Apr 2, 2018 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained

This article walks through a step‑by‑step reconstruction of HTTPS design, showing why secure communication requires per‑client symmetric keys negotiated via asymmetric encryption, digital certificates from trusted CAs, and how signatures and random numbers protect against man‑in‑the‑middle attacks.

HTTPSTLSdigital certificate
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained
Architecture Digest
Architecture Digest
Apr 10, 2016 · Information Security

Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies

This article provides a comprehensive overview of HTTPS, explaining its purpose, advantages, and drawbacks, and delves into the underlying cryptographic concepts such as symmetric and asymmetric encryption, hash algorithms, digital signatures, digital certificates, and the detailed SSL/TLS handshake process.

HTTPSSSLTLS
0 likes · 19 min read
Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies
21CTO
21CTO
Apr 1, 2016 · Information Security

Understanding HTTPS: How SSL/TLS Secures Web Communication

This article explains HTTPS fundamentals, its encryption mechanisms, differences from HTTP, the roles of symmetric and asymmetric cryptography, hash functions, digital signatures, certificate issuance and validation, as well as SSL/TLS protocols, handshake steps, and session resumption techniques that secure web communications.

HTTPSSSLTLS
0 likes · 18 min read
Understanding HTTPS: How SSL/TLS Secures Web Communication