] HTTP is essentially a TCP connection | frederickdudley 忍者ブログ

[PR]

×

[PR]上記の広告は3ヶ月以上新規記事投稿のないブログに表示されています。新しい記事を書く事で広告が消えます。

2025/05/31

HTTP is essentially a TCP connection

HTTP is essentially a TCP connection, but the protocol stipulates the use of port 80 and the format for sending commands or data, while TCP itself has no encryption function. The fatal thing is that during the data transmission process of HTTP, the data is transmitted in clear text. Since the data is not encrypted, it is easy for unsafe behaviors such as data eavesdropping, tampering or identity forgery to occur.

Is there any way to optimize it?

Since it is not safe to use plain text for data transmission, we can try to encrypt the data. For example, the communicating parties can agree on an algorithm that first encrypts the data to be sent according to certain rules,GPRS DTU and then decrypts it according to the same rules after the other party receives the message. This is the embodiment of symmetric encryption.

The so-called symmetric encryption means that the original text and the ciphertext can be encrypted and decrypted using the same key, that is, the same key can be used to encrypt the original text to obtain the ciphertext or to decrypt the ciphertext to obtain the original text. The advantage is that the encryption and decryption efficiency is high.

But there is a key point in using symmetric encryption, that is, the symmetric key. How to determine it? In HTTP requests, encryption key negotiation is still a difficult problem.

How does HTTPS ensure data security?
Data is encrypted during HTTPS data transmission. HTTPS uses symmetric encryption and asymmetric encryption, signature algorithms (signature algorithms are not used for encryption) and certificate mechanisms to process messages to achieve a safe and effective transmission.

HTTPS is based on the upper layer of HTTP and adds a security layer called TLS. Operations such as data encryption are processed in this security layer, and the bottom layer is still the HTTP of the application. HTTPS communication first uses asymmetric encryption to negotiate keys and negotiates a symmetric encryption key. Subsequent communications use this symmetric key for symmetric encryption ciphertext transmission. Because the algorithm of asymmetric encryption is extremely complex, the decryption efficiency is low, while the efficiency of symmetric encryption is significantly higher than a hundred times.

As we mentioned above, using the same key to encrypt and decrypt plaintext is symmetric encryption. So what about asymmetric encryption?

asymmetric encryption
Asymmetric encryption, that is, the original text encryption and the ciphertext encryption use two different keys, one is called the public key and the other is called the private key. Content encrypted using the public Industrial Router/Gateway key can be decrypted through the private key. Likewise, content encrypted using the private key can be decrypted using the public key. Public keys and private keys are relative. Generally speaking, the ones that are kept by oneself and cannot be disclosed to the public are called private keys, and the ones that can be released to the public are called public keys.

Asymmetric encryption uses different keys to encrypt and decrypt plaintext. However, we mentioned above that when using encryption, the difficulty lies in the key agreement process. So, how does HTTPS handle this key agreement process.

PR

2023/09/01 LoRa wirelss modem Comment(0)

COMMENT

COMMENT FORM

NAME
MAIL
WEB
TITLE
COMMENT
PASSWORD

プロフィール
 
性別:
非公開
 
 
カテゴリー
 
 
 
最新記事
 
(01/15)
(01/15)
(11/11)
(11/11)
(08/21)
 
 
RSS
 
 
 
リンク
 
 
 
P R