SSL - Intro to the Bifrost 🌉

SSL - Intro to the Bifrost 🌉

SSL explained in simple terms

Pritom Purkayasta's photo
Pritom Purkayasta
·Feb 5, 2022·

3 min read

Subscribe to my newsletter and never miss my upcoming articles

Listen to this article

Table of contents

  • What does it look like?
  • How does it work?
  • Types of certificates?

On the web, generally, data are transmitted in plain text between the server to the client leaving it vulnerable to eavesdropping. That’s where SSL comes into the picture.

SSL aka Secure Sockets Layer is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser. SSL allows sensitive information like credit card numbers, social numbers, passports, login credentials securely.

What does it look like?

SSL certificates have a key pair.

  1. A public key.
  2. A private key.

These keys work together to establish an encrypted connection. The certificate also contains the “Subject”, which is the identity of the owner.

When a browser attempts to access a website that is secured with an SSL or TLS (successor of SSL), the browser and the web server establish an SSL connection using a process called SSL handshake.

SSL_TLS_Handshake.png

If we deep dive any site network tool we can discover how much time was taken to omit the SSL/TLS handshake process.

Essentially three keys are used to set up the SSL connection.

  1. Public
  2. Private
  3. Session

Anything encrypted with the public key can be decrypted with the private key and vice versa as well. So it's a time-consuming process and it takes some compute power to achieve that but it is only used during the SSL handshake to create a symmetric session key. After the connection is established, the session key is used to do all kinds of encryption and decryption.

How does it work?

There are some steps to create this encrypted channel from the client to the server. let's just say we want to connect to this site pritompurkayasta.me.

  1. At first browser sends a request to that address so that the server can identify itself with a proper certificate.
  2. Server sends a copy of its SSL certificate (Public Key)
  3. Client (Browser) checks the certificate root against a list of trusted CAs and the certificate expiry, unrevoked, and the common name validation for the website that it is connecting to. If the browser trusts the certificate, it will create, encrypt the data using the server's public key and send back the response to the server.
  4. Then server decrypts the response with the session key using its private key and sends the acknowledgment session key to start the encrypted session between the server and the client.
  5. Now server and the client transmitted data with this session key for further communication.

Types of certificates?

There are three types of certificates that exist as what I have found on the internet.

  1. Single Domain Certification. (For a single domain name.)
  2. Wildcard Certification. (Single Domain certificate + Subdomain validation)
  3. Multidomain Certification. (Many websites)

There are also some certification validation levels.

  1. Domain Validation. (For specific domain name, Basic level of SSL)
  2. Organization Validation. (Additional Checks with the SSL issuer)
  3. Extended Validation. (Thorough check of the business that’s behind the purchase, Most secure level of SSL)
 
Share this