This post comes from my share with my team. Many people may not understand HTTPS well, and why the https codes is like that? So I want to share it into Internet too.
Cipher
Java 1.2 has imported a system called “JCE”(Java Cryptography Extension), which is in charge of key and certificates in Java.
We all know if we want to encrypt or decrypt some information, I have to have a key. It’s like if you want to open a door, or lock a door, you have to have a key.
The Key can be generated in Java with KeyGenerator or KeyPairGenerator. The former one is used to generate the symmetric key, and the latter one is used to generate the asymmetric key.
symmetric cryptography — the encryption and decryption use a same key.
asymmetric cryptography
— the encryption and decryption use different keys. Keys are usually is generated as a public key and a private key.
The public key may be widely distributed, while the private key is known only to its proprietor.
In a secure asymmetric key encryption scheme, when a message is encrypted with the public key, only the private key can decrypt it. So if a hacker get you public-key-encrypted message, he cannot decrypt it, because he has no the paired private key. So the transportation of this message is secure.
Certificate
In real life, if you want to buy a diamond and enter a diamond shop, how do you to tell whether the diamond is genuine. As a normal person, you may not have the diamond knowledge. But if the diamond has a licence that is issued by the US government, you may trust this shop.
Certificate is the same. Certificate in the computer world, it may have some keys, another certificate (let’s call it “B”) . The key is what I need, and “B” is an license to prove this certificate is trustable.
Another question: How can I be sure that “B” is trustable? Oh, that’s a good question.
Android has put nearly 150 CA root certificate in our phone. These 150 certificates are really trusted by the whole world, and they are like the chief justice in U.S.
“B” has a another certificate (let’s call it “C”) inside, so we will go check “C” to see if “C” is trustable. … Going through this certificate chain, if we found the last or the root certificate is the same certificate in the 150 pre-put certificates in the phone, then we can trust the original certificate.
p.s. : Certificate has many format.
“x.509” : x.509 certificate is usually used to contain a public key.
“PKCS12” : PKCS12 certificate can also be used to contain a private key. Hence, the PKCS12 certificate need a password to open it.
Https
Finally, we reach the “https” part. Https contains the above “cipher” and “certificate” part, that’s why I talked them before.
Https(Http over SSL) is designed for secure communication over Internet.
1. How to communicate safely?
How do I communitcate safely? Cipher is my first answer. I encrypt my data, and pass the data and the key to the server. Then the server can use this key I passed to decrypte the encrypted messages.
Now let’s look at a possible scenarios: hackers intercept this communication, which means they have the key and the encryped data. If hackers have the key, then it is not difficult to decrypt the data. Now your data leaks!
2. How about Asymmetric Cryptography?
The last solution is not secure at all. So we move on. How about asymmetric cryptography?
This is a great idea. The sever gives you its public key. You use the public Key to encrypt the messages. Since the server is the only one who has the private key, which means only this server can decrypt your encrypted messages. Even if hackers intercept the communication, hackers can do nothing because they have the corresponding private key.
But, asymmetric cryptography takes much longer time to do its job than symmetric cryptography. For the user experience’s sake, it is not a good idea to use asynmmetric cryptography to encrypt/decrypt the whole long content.
3. the final scheme
The previous two solution both failed. How about I combine them all? Yes, this is the final answer. HTTPS : The picture above has clearly shown the process of HTTPS.
[Server] generate the key pair, with a public key and a private key. Let’s call them as “KeyPub”, “KeyPri”.
[Server] server pass the “KeyPub” to the client
[Client] generate a symmetric key (Let’s call it “key2”), and encrypt the messages with “key2”
[Client] encrypt the “key2” with “KeyPub”. So our “key2” is safe, since only the server has the “keyPri”.
[Client] pass the encrypted data and encrypted key to the server
[Server] Decrypt the key with “KeyPri”, and get the “key2”
[Server] Decrypt the data with “key2”. Now the data arrieve in Server safely.
Conclusion
Since the symmetric cryptography is faster than asymmetric cryptography, https decides to use symmetric cryptography to encrypt the data, and use asymmetric cryptography to encrypt the symmetric key to make sure the secruity. In this way, the encryption is fast and secure.
btw. Understanding how HTTPS works is important, because you may use this thoughts in your real life work to keep your data secure.
p.s. RSA, public key in Java
public key is actually a container of two factor : N and e. N is a product of two large prime numbers: N = p * q e is the exponentiated number.
That’s why the RsaPublicKeySpec class in java would have such method:
BigInteger modules = publicKeySpec.getModulus();
BigInteger exponents = publicKeySpec.getPublicExponent();
Combining the modules and exponents, we will get the public key. And by using them, the client can get the PublicKey
object in java.