Skip to main content
Tech Radar
  • Tech Radar Pro
  • Tech Radar Gaming
Tech Radar Pro TechRadar IT Insights for Business
Subscribe
RSS
(opens in new tab) (opens in new tab) (opens in new tab) (opens in new tab)
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
Technology Magazines
(opens in new tab)
Technology Magazines (opens in new tab)
Why subscribe?
  • The best tech tutorials and in-depth reviews
  • Try a single issue or save on a subscription
  • Issues delivered straight to your door or device
From$12.99
(opens in new tab)
View Deal (opens in new tab)
  • News
  • Reviews
  • Features
  • Opinions
  • Website builders
  • Web hosting
  • Security
Trending
  • Best standing desk deals
  • Best cloud storage 2023
  • What is Microsoft Teams?
  • Windows 11 for business

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

  1. Home
  2. VPN
  3. Computing
Supported (opens in new tab)

What is SSL?

By Nate Drake

What is SSL and how does it secure your online communications?

Macbook on a desk with coding displayed on screen
(Image credit: Unsplash / Emile Perron)

Secure Sockets Layer (SSL) is an internet security protocol, establishing encrypted connections between computers on a network, such as the internet.

For example, logging into your online banking without the encrypted connections provided by SSL means anyone monitoring your connection could see your passwords and other sensitive financial data.

Alice, Bob, and Eve 

Computer security specialists often refer to two parties trying to securely exchange information like this as ‘Alice’ and ‘Bob’. There is also ‘Eve’ who is intent on eavesdropping on their connection. 

If Alice wants to communicate with Bob securely, they need to encrypt their data. But what is encryption?  In the early days of the internet, all encryption was symmetric - the key used to encrypt data was the same key used to decode it.

In order to encrypt data safely and exchange messages, Alice and Bob needed to agree on a shared key. This was usually done via Data Encryption Standard (DES). 

DES keys were relatively weak (56 bits), and vulnerable to brute-force attacks by powerful computers trying every possible password combination until it hit on the right one. There also was the problem of key distribution. Once your data is encrypted, how do you send the symmetric key to decode it to someone who might be on the other side of the world?

SSL: Public and private keys 

SSL, developed by Netscape in 1995, was designed to solve Alice and Bob’s problem. 

As it’s core, SSL (now known as Transport Layer Security or TLS) uses asymmetric encryption, or Public Key Cryptography. The (Public) key used to encrypt data is not the same as the secret (Private) key used to decrypt it. 

The keys are related in a mathematical sense being based on factoring extremely large prime numbers. It’s not important to understand this in-depth except to say that knowing someone’s public key only allows you to encrypt data for them to decode: it cannot be used the other way round.

How SSL works 

So, how does SSL work? The answer lies in a combination of traditional symmetric encryption and public key cryptography.

When Alice wants to securely communicate with Bob without Eve listening in, they first perform a virtual handshake. Traditionally, this allowed them to establish specific SSL protocols and encryption algorithms were supported.

Alice’s device uses Bob’s public key to generate a shared secret symmetric encryption key for this particular connection. Bob’s device then uses Alice’s public key to securely confirm that this is the key to use. Having established a common symmetric encryption key, communications are now secure

Using both public key and regular symmetric encryption may sound overelaborate but it has a big advantage. Symmetric encryption is much faster than asymmetric, so it makes much more sense to use public keys as little as necessary.

This set-up is a nightmare for bad actors like Eve. She may well be able to monitor the data passing between Alice and Bob’s devices, but unable to make sense of it. Knowing public keys isn’t helpful for decrypting the data and once the data is encrypted by a symmetric key, it’s equally meaningless. 

SSL certificates 

There is a flaw in the SSL security model up until now: what if a bad actor tries to intercept Alice and Bob’s connection and impersonate Bob? In that case they could supply their own Public Key to Alice to read all her sensitive personal data.

This is where SSL Certificate authorities come in. Certificate Authorities (CA) are publicly trusted, issuing digital SSL certificates and public keys to people or websites. They also use their own private key to digitally sign these certificates, so others can check it’s valid.

Almost all modern browsers come preloaded with details of trusted certificate authorities and their public keys, so it’s easy to check that the SSL certificate for a particular site is valid. To find out if a website is secured by SSL, you can check for a padlock icon on the address bar - give it a click for more information. 

Each time your device connects to a website using SSL (indicated by a web address that starts “https://”), the site sends its SSL certificate, including its public key. Your web browser then validates the certificate, and alerts you if the site appears to lack security.

In practice there are several types of different certificates, but back in the original days of SSL, a certificate was simply used to establish that this is the valid public key for that particular domain. 

SSL today 

SSL hasn’t seen an update since SSL 3.0 in 1996. Today, the more secure TLS is its successor, becoming the most widely used protocol for securing website traffic. 

Given the popularity of SSL, many web users still refer to web traffic encryption as SSL or SSL/TLS. Although Certificate Authorities only offer TLS certificates, they’re still commonly referred to as SSL certificates.

While no form of security is entirely perfect, using SSL/TLS hugely reduces the risk of data traffic between your device and websites being abused by bad actors. The trick to avoiding any SSL issues is making sure your set-up is correct. 

Today's best overall VPNs
Express VPN (opens in new tab)
ExpressVPN 12 month
(opens in new tab)
$6.67
/mth
(opens in new tab)
View Deal (opens in new tab)
UP TO 1 YEAR FREE
NordVPN (opens in new tab)
NordVPN 2 Year
(opens in new tab)
$3.49
/mth
(opens in new tab)
View Deal (opens in new tab)
Exclusive discount
HotSpot Shield (opens in new tab)
Hotspot Shield 3 year
(opens in new tab)
$2.49
/mth
(opens in new tab)
View Deal (opens in new tab)
+2 months free
Surfshark (opens in new tab)
Surfshark 24 Months
(opens in new tab)
$2.30
/mth
(opens in new tab)
View Deal (opens in new tab)
+3 MONTHS FREE
Private Internet Access (opens in new tab)
Private Internet Access 24 Month
(opens in new tab)
$2.11
/mth
(opens in new tab)
View Deal (opens in new tab)
We check over 250 million products every day for the best prices

TechRadar Pro created this content as part of a paid partnership with ExpressVPN.

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

By submitting your information you agree to the Terms & Conditions (opens in new tab) and Privacy Policy (opens in new tab) and are aged 16 or over.
Nate Drake
Social Links Navigation

Nate Drake is a tech journalist specializing in cybersecurity and retro tech. He broke out from his cubicle at Apple 6 years ago and now spends his days sipping Earl Grey tea & writing elegant copy.

  1. Richard Montanez looks at someone while stacking shelves in Flamin' Hot
    1
    Hulu and Disney Plus will make streaming movie history in June – and it's about time
  2. 2
    I test PC gaming headsets for a living - and these are my top picks for every budget
  3. 3
    5 ways that ChatGPT is better than Google Bard (and 3 ways it isn't)
  4. 4
    9 surprising foods to cook in an air fryer
  5. 5
    This $399 AMD-based one-eyed PC is one of the wackiest designs I’ve seen in 25 years
  1. How to watch Rabbit Hole online – stream every episode of the new spy thriller starring Kiefer Sutherland
    1
    How to watch Rabbit Hole online – stream the new spy thriller starring Kiefer Sutherland free online
  2. 2
    Netflix’s auto-play feature is the absolute worst
  3. 3
    Microsoft pushes out an emergency fix for the dangerous 'acropalypse' bug
  4. 4
    5 foods to avoid putting in the air fryer
  5. 5
    Google's slow destruction of Fitbit is everything wrong with modern tech
Technology Magazines
(opens in new tab)
  • ●
Technology Magazines (opens in new tab)
  • The best tech tutorials and in-depth reviews
From$12.99
(opens in new tab)
View Deal (opens in new tab)

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site (opens in new tab).

  • About Us (opens in new tab)
  • Contact Us (opens in new tab)
  • Terms and conditions (opens in new tab)
  • Privacy policy (opens in new tab)
  • Cookies policy (opens in new tab)
  • Advertise with us (opens in new tab)
  • Web notifications (opens in new tab)
  • Accessibility Statement
  • Careers (opens in new tab)

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.