TLS 1.3, the latest version of the TLS protocol published in August 2018 by the IETF (RFC 8446) has a great future ahead of it. It meets the current needs of “full https”, which is widely adopted by web giants, while offering better performance and security than TLS 1.2. Increasing numbers of web servers and […]
Lire PlusDigital certificates
California: How a certificate outage delayed COVID-19 data
Public and private bodies are using an increasing number of digital certificates to secure their electronic communications. The expiration of a single certificate is often enough to stop an application or even an entire infrastructure from working. That’s what happened in California in mid-summer, preventing 300,000 COVID-19 results from being sent from laboratories to the […]
Lire PlusTLS Handshake: protocol and two-way authentication mechanism
The TLS secure digital communications protocol includes a sub-protocol called TLS Handshake. This enables the server and client to authenticate each other in turn then select an encryption algorithm and cryptographic key before the application sends the data. Here’s how it works.
Lire PlusInsecure connection: the 5 digital certificate warning messages
Sometimes a website can’t be accessed and the browser shows a “not secure” warning. In fact, this warning is displayed when the website’s certificate isn’t recognized. This could be because it has expired or doesn’t exist, is self-signed, from an unrecognized authority or […]
Lire PlusWhich TLS certificate should I choose to secure my website?
There are three main types of TLS (formerly SSL) certificate for protecting a website: domain validation (DV), organization validation (OV) and extended validation (EV). There is often much confusion about the different TLS certificates, not to mention users who struggle to understand what the padlock and “not secure” in their browser’s address bar really mean. […]
Lire Plus