What is SSL Mortgage Form

What are SSL, TLS and HTTPS?

#

256-bit encryption Process in which an electronic document is encoded with the aid of an algorithm whose key is 256 bits long. The longer the key, the stronger the coding.

A.

Asymmetric cryptography This is encryption that requires a pair of 2 keys during the coding and decoding process. In the world of SSL and TLS, we call them public and private keys.

C.

Certificate Signing Request (CSR) In German: Certificate Signing Request - a machine-readable form of a DigiCert certificate application. A CSR usually contains the public key and the identifying name of the requester.

Certification Authority (CA) In English: Certification Authority - A unit that is authorized to issue, suspend, renew or revoke certificates as part of a CPS (Certification Practice Statement) CAs are identified by a distinctive name on all certificates and CRLs that issue them, identified. A certification authority must publish its public key or present a certificate from a higher-ranking CA to prove the validity of its public key if it is subordinate to a primary certification authority. DigiCert is a Primary Certification Authority (PCA).

Cipher suite This is a set of key exchange protocols that contain the authentication, encryption, and message authentication algorithms used within SSL protocols.

Common Name (CN) In English: Common name - An attribute value within the distinctive name of a certificate. For SSL certificates, the Common Name is the DNS host name of the website to be secured. For Software Publisher Certificates, the Common Name is the company name.

Connection Errors If security issues prevent a secure session from starting, you will see connection errors when you try to access a website.

D.

Domain Validation (DV) SSL Certificates The simplest of all SSL certificates, in which only possession of the domain name is validated before the certificate is issued.

E.

Elliptic Curve Cryptography (ECC) In English: Elliptic Curve Cryptography - Creates encryption keys based on the idea that points on a curve are used to create the public / private key pair. It is extremely difficult to crack using the brute force methods often used by hackers and offers a faster solution with less processing power than pure RSA chain encryption.

Encryption Process in which readable data (simple text) are converted into an illegible form (encrypted text) so that the original data either cannot be restored (simple encryption) or cannot be restored without using an inverse decoding process ( mutual encryption).

Extended Validation (EV) SSL Certificates The most comprehensive of all secure certificates that validates the domain, requires very strict authentication of the company and is displayed in the address bar.

K

Key Exchange This is the way in which users and servers establish a secure pre-master secret for a session.

M.

Master Secret The key material that is used to generate coding keys, MAC secrets and initialization vectors.

Message Authentication Code (MAC) In English: Message Authentication Code - A simple hash function that is arranged over a message and a secret.

O

Organization Validation (OV) SSL Certificates A type of SSL certificate that validates ownership of the domain and the existence of the company behind it.

P.

Pre-Master Secret The key material that is used to derive the master secret.

Public Key Infrastructure (PKI) In English: Public key infrastructure - architecture, organization, techniques, practices and other procedures that together support the implementation and operation of a certificate-based public cryptographic key system. The PKI consists of systems that work together to provide and implement the public cryptographic key system and possibly other related services.

S.

Secure server Server that protects the host websites using SSL or TLS. When a secure server is used, the server is authenticated to the user. In addition, the user's information is encrypted by the user's web browser's SSL protocol before it is sent over the Internet. Information can only be decrypted by the host side that requested it.

SAN (Subject Alternative Name) SSL certificates Type of certificate that can be used to secure multiple domains with one SSL certificate.

SSL stands for Secure Sockets Layer. Protocol for web browsers and servers that can be used to authenticate, encode, and decode data sent over the Internet.

SSL certificate Server certificate that enables the server to authenticate to the user, as well as the encryption of data transmitted between the server and the user. SSL Certificates are sold and issued directly by DigiCert and through DigiCert's managed PKI for SSL Centers.

SSL handshake A protocol used within SSL for security negotiation.

Symmetric encryption Encryption method in which the same key is used during the encoding and decoding processes.

T

TCP Transmission Control Protocol, one of the main protocols on any network.

W.

Wildcard SSL certificates Type of certificate that is used to secure multiple subdomains.