Home >Technology peripherals >It Industry >What SSL Is, and Which Certificate Type is Right for You
This article is sponsored by GoGetSSL. Thank you for supporting the partners who made SitePoint possible.
The incidence of cybercrime has risen sharply over the past decade. Many well-known corporate organizations and government agencies that have not yet implemented adequate cybersecurity measures have suffered losses. Google has begun to take a tough stance on sites that do not use HTTPS. If a visitor is about to submit any information through an unsafe connection, a warning will be issued.
This article will guide you on how to protect customers and businesses from privacy violations and data theft. You will learn how to use SSL technology to protect your website and applications from leaking sensitive data to eavesdroppers.
This article will not explain how to install SSL, because this is an advanced topic. You can find more information about the installation process here.
Imagine you are in a hotel room, using your laptop to connect to the hotel's WIFI. You will be logged into the bank's online portal soon. Meanwhile, a malicious hacker cleverly booked the room next to you and set up a simple station to listen to all the network traffic in the hotel building. All traffic using the HTTP protocol can be viewed in plain text by hackers.
Suppose the bank's website only uses HTTP, then the form details such as username and password will be seen by the hacker once you press the submit button. So how do we protect this data? The answer is obviously encryption. Data encryption involves converting plain text data into something that looks garbled—that is, encrypted data. To encrypt plain text data, you need what is called an encryption algorithm and a password key.
Suppose you want to encrypt the following data:
<code>Come on over for hot dogs and soda!</code>
The encrypted form is as follows:
<code>Come on over for hot dogs and soda!</code>
Using current computing power, decrypting the above messages without a password key may take more than a lifetime. Unless they have a password key to encrypt it, no one can read it. This type of encryption is called symmetric encryption. Now that we have figured out how to protect the data, we need a secure way to securely transfer the password key to the recipient of the message. We can do this by using an asymmetric encryption system called public key encryption.
Public key encryption uses a pair of mathematically related password keys:
<code>wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmaw q6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBi N5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7G mNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf =PAb3</code>If you change anything in the document, even if you add a period, a brand new hash value is generated when you run the hash function again:
<code>46798b5cfca45c46a84b7419f8b74735</code>The sent hash does not match the generated hash, which means that the file has been changed. This is the first line of defense to ensure that the SSL certificate has not been changed. However, we need to verify that the sent hash value is created by the issuer of the certificate. This is done by encrypting the hash value using the issuer's private key. When we perform a local hash on the certificate and then decrypt the signature of the certificate to get the sent hash value, we can compare the two. If it matches, it means:
Now, you may be wondering where we get the issuer's public key and why we should trust it. The issuer's public key is pre-installed in our operating system and browser. Issuer is a trusted certificate authority (CA) that signs certificates according to the official CA/browser forum guide and NIST recommendations. For example, here is a list of some trusted issuers/CAs that you will find on your Microsoft operating system. Even smartphones and tablets, operating systems and browsers have similar lists preinstalled.
According to a survey conducted by W3Techs in May 2018, the following authorities account for approximately 90% of valid certificates issued worldwide:
Now that you have learned about encryption and SSL technology, it's best to review how to securely log into the bank portal using HTTPS without having your traffic read next door hackers.
This means that form data sent from the laptop and HTML data from the server will be encrypted using a password key that is not accessible to the hacker. What you see in the captured traffic log will be just garbled letters and numbers. Your information is now protected from the Eye of Snooping.
Now that you understand how SSL works in general, let's move on to the next section to learn about the different types of SSL certificates we can use.
Domain verification is the most affordable and common type of SSL certificate that can be issued to anyone to protect public domain websites. In order to purchase this type of SSL certificate, you need to prove that you are the owner of the domain you want to protect. That's why it's called domain validation. This is done in one or more of the following ways:
As of September 2019, Google Chrome is currently the most popular web browser, accounting for about 70% of the global desktop browser market share. Google recently strengthened its stance on site owners enforcing security protocols to ensure that end users’ privacy is protected. Unprotected websites will be marked as unsafe. If users try to submit forms to unprotected sites, they will also be strongly advised not to do so. If the SSL certificate of the website expires or is invalid, the website will be temporarily blocked.
If you don't want to lose valuable traffic because your website is not protected, you need to make sure you get at least a domain-verified SSL certificate. It only takes 5-8 minutes to obtain a certificate.
SSL certificates are often used to protect fully qualified domain names, such as www.domain.com. If you want to protect a public IP address, you need to obtain a public IP SAN SSL certificate. SAN represents the principal alternative name, which is a field on the certificate field that can be used to save the IP address.
The normal SSL certificate is only available for a single domain, such as www.domain.com. If you want to protect the subdomain, you must purchase a new SSL certificate for this. Instead of buying a new SSL certificate for each subdomain you manage, you can simply buy a wildcard SSL certificate, which will work for your subdomain, i.e. *.domain.com. It is more cost-effective than buying multiple SSL certificates. Using an SSL certificate is also easier to manage.
However, if the subdomain is compromised, it means that all subdomains using the same certificate are compromised. You need to revoke it and request a new certificate. If you don't want to encounter such problems, you can also purchase one separately.
As the name implies, you can purchase a multi-domain SSL certificate, which can protect up to 250 domains and subdomains. This type of certificate is especially useful for protecting hundreds of office communication servers that may span different geographical areas. Even if the traffic is limited to the company's network, it's best to use SSL for protection, as rogue employees can easily monitor and record everyone's traffic.
Since 2019, organizations can be verified worldwide using LEI (Legal Entity Identifier) codes. This simplifies and significantly speeds up the verification process. Enterprises can obtain LEI codes through the official GLEIF registration agency.
Legal Entity Identifier (LEI) is a unique code used to identify any global company involved in financial transactions. This process is carried out in accordance with international standard ISO 17442. The goal is to help monitor and measure systemic risks and effectively and inexpensively support compliance with regulatory reporting requirements.
I hope you have enough information now to decide which SSL certificate to purchase. Please note that the SSL certificate is valid for only two years. This is a security feature that ensures that the information on the certificate remains up to date. It also ensures that any missing keys are not used to penetrate traffic. Free SSL certificates are usually valid for 90 days. If you want to make sure you don't forget to purchase renewal, you can get a 3-year or 4-year subscription plan. Please note that the two-year limit rate applies. You will receive a contact at the end of the expiration date to replace the certificate with a new one. The advantage of choosing a longer subscription plan is that you can save money compared to annual purchases.
What is SSL? SSL (Secure Sockets Layer) is an encryption protocol designed to provide secure communication on a computer network. It is usually used to protect data transfer between user's browser and website server.
Why is SSL important? SSL is important for protecting sensitive information transmitted over the Internet, such as login credentials, credit card details, and other personal data. It encrypts data to prevent unauthorized access and eavesdropping.
What is an SSL certificate? An SSL certificate is a digital certificate that is used to verify the identity of a website and enable secure, encrypted communication. It is issued by a Certificate Authority (CA) and contains information about the certificate holder.
How to get an SSL certificate for my website? To obtain an SSL certificate, you can purchase one from a Certificate Authority (CA), or use a certificate provided by a trusted CA, such as Let's Encrypt. After you have obtained the certificate, you need to install it on your web server.
What is HTTPS? HTTPS (Hypertext Transfer Protocol Security) is a secure version of HTTP. It uses the SSL/TLS protocol to encrypt data transmitted between the user's browser and the website server. Websites using HTTPS display lock symbols in the address bar.
The above is the detailed content of What SSL Is, and Which Certificate Type is Right for You. For more information, please follow other related articles on the PHP Chinese website!