What is Public-Key Cryptography?

Public-Key Cryptography, which is also known as asymmetric cryptography, is a system that uses pairs of keys to encrypt and authenticate information. One key in the pair is a public key which can, as the name suggests, be distributed widely without impacting security. The second » Continue Reading.

What Are The Requirements for SSL.com OV Certificates?

  Organization Validation (OV) and Individual Validation (IV) certificates – also known as High Assurance certificates – require validation of an organization’s or individual’s identity and address before issuance. For website owners, an SSL.com High Assurance certificate gives visitors to your site an extra level of confidence in your web » Continue Reading.

What is HTTPS?

HTTPS (Hypertext Transfer Protocol Secure) is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication. HTTPS is specified by RFC 2818 (May 2000) and uses port 443 by default instead of HTTP’s port 80. An HTTPS URL begins with https:// instead of http://. Modern web browsers also indicate » Continue Reading.

What is SSL?

  SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted links between networked computers. Although the SSL protocol was deprecated with the release of TLS 1.0 in 1999, it is still common to refer to these » Continue Reading.

What Is an X.509 Certificate?

  X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations. First introduced in 1988 alongside the X.500 standards for electronic directory services, X.509 has been adapted for internet use » Continue Reading.

What is DNS over HTTPS (DoH)?

DNS over HTTPS (DoH) uses the HTTPS protocol for sending and retrieving encrypted DNS queries and responses. The DoH protocol has been published as a proposed standard by the IETF as RFC 8484. DNS queries and responses have historically been sent as plaintext, potentially compromising the privacy of » Continue Reading.

What is a “man in the middle” attack?

In a man in the middle (or MITM) attack, communication between two devices in a computer network is compromised by a third party – the “man in the middle.” In a passive MITM attack attackers “tap” the communication, capturing information in transit without changing it. If attackers attempt to to modify or tamper with » Continue Reading.

What is an idempotent request?

In computer science, an operation is idempotent if it can be performed multiple times without having a different result than the first time it was run. For example, a POST HTTPS request that updates a counter in the database is not idempotent because it alters » Continue Reading.