SSL The Secure Socket Layer protocol was created by Navigator

The Secure Socket Layer protocol was created by Navigator Internet browser in 1994. It is
used to ensure secure transactions between web servers and browsers. The protocol uses a third
party, a Certificate Authority (CA), to identify one end or both end of the transactions. A
browser requests a secure page (usually https ://).
How it works.
1. The web server sends its public key with its certificate.
2. The browser checks that the certificate was issued by a trusted party (usually a trusted
root CA), that the certificate is still valid and that the certificate is related to the site
3. The browser then uses the public key, to encrypt a random symmetric encryption key
and sends it to the server with the encrypted URL required as well as other encrypted
http data.
4. The web server decrypts the symmetric encryption key using its private key and uses
the symmetric key to decrypt the URL and http data.
5. The web server sends back the requested html document and http data encrypted with
the symmetric key.
6. The browser decrypts the http data and html document using the symmetric key and
displays the information.
In Simple Way to understand:When a browser attempts to access a website that is secured by SSL, the browser and the web
server establish an SSL connection using a process called an “SSL Handshake”. Essentially,
three keys are used to set up the SSL connection: the public, private, and session keys.
Anything encrypted with the public key can only be decrypted with the private key, and vice
versa. Because encrypting and decrypting with private and public key takes a lot of processing
power, they are only used during the SSL Handshake to create a symmetric session key. After
the secure connection is made, the session key is used to encrypt all transmitted data.
SSL allows sensitive information such as credit card numbers, social security numbers, and login
credentials to be transmitted securely. Normally, data sent between browsers and web servers is
sent in plain text—leaving you vulnerable to eavesdropping. If an attacker is able to intercept all
data being sent between a browser and a web server they can see and use that information. More
specifically, SSL is a security protocol. Protocols describe how algorithms should be used; in this
case, the SSL protocol determines variables of the encryption for both the link and the data being
Third Party CA Best Example:-
IRTC Certificate Authority: - (Mozilla Firefox)
SSL Secured HTTPS Link
Security Information of IRTC
Third Party Certificate of IRTC
Certificate Contents (validity, Subject, Encryption Algorithm Details etc..)
How to identify the link is secured or not: - (Google chrome)