Web Host Butler
Company
Hosting
Domain
Articles
 
 
Home | Contact Us | FAQ | Web Rating | Site Map
cheap web hosting
 

Secure Socket Layer

SSL stands for secure socket layer protocol. Firstly Netscape designed this protocol for secure online transactions. In initial days it was only used between the web servers and browsers. In this protocol a third party is involved, which is called Certificate Authority (CA). This third party operates the both end transactions. You have to buy IIS SSL certificate in order to make your site secure. When you host a site, make sure that you are hosting your site on secure server hosting. There are many cheap web hosting companies that provide cheap ssl certificates. But the Richmond SSL certificates are considered best through the world.

Working Of SSL
Following are some discussion points about how digital SSL certificates work?

  • First if all, browser sends a request for a secure page. The URL you type in the browser.
  • In response to this web server returns the public key with the certificate.
  • After taking the certificate the browser check: that is this a valid ssl security certificate issued by some trusted party.
  • After completion of verification, the browser use the public key to encrypt the data and send this encrypted data to the server along with some other important HTTP data.
  • After receiving this encrypted data from the browser, the web server de-crypt the data by using the private key.
  • After this the web server returns the requested data, which is always encrypted.
  • Then browser receives the specific data and decrypts it by using a symmetric key and shows it as information to visitorn.


Private Key/Public Key
Private and public keys are the two main points, which ensure the data encryption. One of the key is used to encrypt the data while other one is used to decrypt the data. Data can only be decrypt with the private key in digital SSL certificate. The public key is distributed to every one, so that every one can encrypt the data. But the private key is kept in secret, so that permitted person can decrypt the data. The data you will encrypt will only be correctly decrypted with the help of public key. To know the public key of your opponent, you will receive a message from your correspondent, which contains the public key along with the certificate.

The Certificate
How do you know that the dealing person or the web site is right one? To ensure this the certificate authority keep all the private information of the users such as the name, e-mail id, the use of certificate, duration of the certificate used, and other necessary informationís. This certificate does not hold the private key; this key does not transfer in any situation. This certificate contains all the information and encrypted messages, when it receives by the owner. The owner then use private key to decrypts this message.

Web Hosting Pad

webhosting pade

Unlimited Space
Unlimited Bandwidth
Host Unlimited Domains
POP3/IMAP EMail
Free Domain
SSL Secure Server
Free Site Builder
CGI-BIN
PHP Nuke
Mambo and Joomla
Perl / Python
Ruby on Rail V1.1
Front Page Extensions
OS Commerce Shopping Cart
Instant Setup
No Setup Fee
Free 24/7 support

                              Price    $3.88 / month

 Read Review          SIGN Up Now