Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » Which internet protocol is used to transmit encrypted data?
    HTTPS
    HTTPS
    IoT

    Which internet protocol is used to transmit encrypted data?

    By Yun ZhaoApril 17, 2024No Comments4 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • HTTPS uses encryption for secure communication over a computer network and is widely used on the Internet.
    • HTTPS ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cypher suites are used, and the server certificate is verified and trusted.
    • HTTPS needs to be improved in plaintext data transmission and message integrity detection.

    Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website. HTTPS is encrypted to increase the security of data transfer.

    What is HTTPS

    Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS or HTTP over SSL.

    Also read: What is computer network infrastructure?

    HTTPS principles

    The principal motivations for HTTPS are authentication of the accessed website and protection of the privacy and integrity of the exchanged data while it is in transit. It protects against man-in-the-middle attacks, and the bidirectional block cypher encryption of communications between a client and server protects the communications against eavesdropping and tampering.

    The authentication aspect of HTTPS requires a trusted third party to sign the server-side digital certificates. This was historically an expensive operation, which meant that fully authenticated HTTPS connections were usually found only on secured payment transaction services and other secured corporate information systems on the World Wide Web (WWW).

    In 2016, a campaign by the Electronic Frontier Foundation (EFF) with the support of web browser developers led to the protocol becoming more prevalent. HTTPS is now used more often by web users than the original, non-secure HTTP, primarily to protect page authenticity on all types of websites, secure accounts, and keep user communications, identity, and web browsing private.

    Advantages of HTTPS

    The HTTPS protocol authenticates users and servers, ensuring that data are sent to the correct clients and servers.

    The HTTPS protocol is a network protocol constructed from SSL + HTTP that allows for encrypted transmission and authentication. It prevents data from being stolen or altered during transmission and ensures data integrity.

    HTTPS is the most secure solution under the current architecture. Although it is not absolutely secure, it significantly increases the cost of man-in-the-middle attacks.

    Also read: DuckDuckGo bundles VPN with privacy protection

    Limitations of HTTPS

    In the same network environment, HTTPS protocol increases page load times by nearly 50% and increases power consumption by 10% to 20%. In addition, HTTPS protocol affects caching, increasing data overhead and power consumption.

    The security of the HTTPS protocol is scoped and plays little role in hacking, denial-of-service attacks, and server hijacking.

    Crucially, the credit chain system for SSL certificates is not secure. Man-in-the-middle attacks are just as feasible, especially when certain countries can control CA (certificate authority) root certificates.

    The cost has increased. After the deployment of HTTPS, the work of HTTPS protocol to increase the consumption of additional computing resources, such as the SSL protocol encryption algorithm and the number of SSL interactions, will take up a certain amount of computing resources and server costs.

    In the scenario of large-scale user access applications, the server needs to perform encryption and decryption operations frequently, and almost every byte needs to be encrypted and decrypted, which generates server costs.

    With the development of cloud computing technology, the cost of using servers deployed in data centres gradually decreases as the scale increases, and the input cost has dropped to an acceptable level relative to the security enhancement of user access.

    HTTPS IP address
    Yun Zhao

    Yun Zhao is a junior writer at BTW Media. She graduates from the Zhejiang University of Financial and Economics and majors in English. Send tips to s.zhao@btw.media.

    Related Posts

    SK hynix targets 3D DRAM mass production by 2026

    July 7, 2025

    Unique Network President Charu Sethi on decentralised Web3 growth

    July 7, 2025

    Should AFRINIC elections be managed by an external body?

    July 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.