Solved

How HTTPS works?

Posted on 2011-02-19
2
259 Views
Last Modified: 2012-05-11
As per my understanding.. Web server keeps the Private and Public key and distribute it's public key and all the clients who want to connect to it's web server.

So Web server uses it's private key for encrypt and decrypt the message to client.. whereas client uses *only* the public key of web server for encrypt and decrypt the message to web server.

I would like to know.. why client doesn't use it's own private key here? I believe in Public Key Infrastructure (PKI) both party needs to have their own private and public key pair to participate. Why the private key of client is missing here? Thanks!
0
Comment
Question by:beer9
2 Comments
 
LVL 10

Accepted Solution

by:
cyberstalker earned 500 total points
ID: 34936121
The reason is that it is the client that needs to know if the server is who they say they are. You are not checking the identity of the user.

It is possible to set this up if you like. However, this only makes sense in, for example, a corporate environment where you need to make sure only certain computers can open your website, since you would need to set up a public key for the browser and add all the public keys to your webserver to verify them.
0
 

Author Comment

by:beer9
ID: 34936723
Thanks cyberstalker for your detailed explanation. I have one more concern.

In the web server and client interaction.. web server encrypt message with his private key which can only be decrypt using his public key and it is freely/openly available. So there is a chances that in man-in-the-middle attack hacker would capture the packet which web server sends to client and would able to decipher it using the public key of web server. So all the communication which web server sends to it's client is viewable by hacker.

So here the security is compromised, isn't it?
0

Featured Post

ScreenConnect 6.0 Free Trial

Explore all the enhancements in one game-changing release, ScreenConnect 6.0, based on partner feedback. New features include a redesigned UI, app configurations and chat acknowledgement to improve customer engagement!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you need a certificate so you can offer SSL encryption.  But which one should you get?  There are so many choices out there! Here is a generic overview of the main types of SSL certificates sold by the majority of commercial Certification Auth…
#SSL #TLS #Citrix #HTTPS #PKI #Compliance #Certificate #Encryption #StoreFront #Web Interface #Citrix XenApp
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question