Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
HTTP/HTTPS | Backend Development Basics
Spring Boot Backend
course content

Course Content

Spring Boot Backend

Spring Boot Backend

1. Backend Development Basics
2. Spring Boot Basics
3. RESTful API
4. Working with Databases
5. Testing Backend Applications

HTTP/HTTPS

We have covered the topic of HTTP, how it works, and what it is used for, but in modern browsers, you might notice a prefix at the start of each link: HTTPS.

The main difference between these protocols is that one has an 'S' at the end, which stands for 'Secure'. This means HTTPS provides greater security.

Previously, all websites used HTTP, which did not provide a secure connection and transmitted data in an unencrypted form. This made them vulnerable, as the data could be intercepted and read before the intended information reached its recipient.

Note

In HTTPS, data is transmitted in an encrypted form, so even if someone intercepts the traffic, they will only receive encrypted information.

Later, HTTPS was developed, which adds an extra layer of security by encrypting data using SSL/TLS (encryption protocols). This provided protection against interception and manipulation of data, and now HTTPS is the standard for ensuring security on the internet.

Real Life Example

Imagine you are sending a letter through regular mail. If you use HTTP, it is like sending a postcard: anyone who intercepts or sees it along the way can read what is written. All the information is visible and accessible to everyone.

Now, if you use HTTPS, it is similar to sending a letter in a sealed envelope with tamper-evident protection. Only the sender and the recipient know what is inside, and if anyone tries to tamper with the envelope along the way, it will be immediately noticeable, keeping the information secure.

Note

HTTPS encrypts data, making it safe and hidden from prying eyes, just like a protected envelope.

How does HTTPS Work?

The HTTPS protocol involves a process where, upon establishing a connection, the client and server agree to use a temporary key to encrypt and decrypt messages.

The essence lies in using a pair of keys: one key is used for encrypting messages (public key), while the other is used for decrypting them (private key).

Both keys belong to the same party, in this case, the server. The private key is kept secret, while the public key can be freely shared with clients. The clients use this public key to encrypt messages, which are then sent to the server.

In this setup, the client sends information to the server that has been encrypted with the public key. The server possesses the private key, which can decrypt this information and retrieve the data.

Even if someone intercepts the traffic and obtains this information, they will not be able to do anything with it because it is encrypted. To decrypt it, they would need the private key, which is stored on the server and has not been shared with anyone.

1. What does the `S` in HTTPS stand for?
2. Which of the following protocols provides data encryption?
3. Which key is used for encrypting data in `HTTPS`?

What does the S in HTTPS stand for?

Select the correct answer

Which of the following protocols provides data encryption?

Select the correct answer

Which key is used for encrypting data in HTTPS?

Select the correct answer

Everything was clear?

Section 1. Chapter 3
We're sorry to hear that something went wrong. What happened?
some-alt