Solved

How HTTPS works?

Posted on 2011-02-19
2
250 Views
Last Modified: 2012-05-11
As per my understanding.. Web server keeps the Private and Public key and distribute it's public key and all the clients who want to connect to it's web server.

So Web server uses it's private key for encrypt and decrypt the message to client.. whereas client uses *only* the public key of web server for encrypt and decrypt the message to web server.

I would like to know.. why client doesn't use it's own private key here? I believe in Public Key Infrastructure (PKI) both party needs to have their own private and public key pair to participate. Why the private key of client is missing here? Thanks!
0
Comment
Question by:beer9
2 Comments
 
LVL 10

Accepted Solution

by:
cyberstalker earned 500 total points
Comment Utility
The reason is that it is the client that needs to know if the server is who they say they are. You are not checking the identity of the user.

It is possible to set this up if you like. However, this only makes sense in, for example, a corporate environment where you need to make sure only certain computers can open your website, since you would need to set up a public key for the browser and add all the public keys to your webserver to verify them.
0
 

Author Comment

by:beer9
Comment Utility
Thanks cyberstalker for your detailed explanation. I have one more concern.

In the web server and client interaction.. web server encrypt message with his private key which can only be decrypt using his public key and it is freely/openly available. So there is a chances that in man-in-the-middle attack hacker would capture the packet which web server sends to client and would able to decipher it using the public key of web server. So all the communication which web server sends to it's client is viewable by hacker.

So here the security is compromised, isn't it?
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

We've all had that page pop up telling us there is a problem with the certificate and some of us continue on anyways and others run away to a safer competing site.  But what to do when you get the error - is it your problem or theirs?  What can you …
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now