How does an SSL certificate work?

When internet user attempts to access a website that is equipped with a working SSL Certificate, the client's browser requests the server of the website for identification purposes. The server then responds by sending a copy of the SSL certificate. The client's browser checks the SSL certificate copy and analyses whether to trust the certificate or not, it then sends a message to the server. If the certificate is trusted the server sends a digitally signed acknowledgement so the client's browser can start an encrypted session. Once the digitally signed acknowledgement is received, encrypted communication starts between server & the client's browser. Finally, after all of this, the HTTPS protocol will be visible.

What is a Site seal (Secured seal)?

A Site Seal is a symbol of online trust that indicates an organization has taken steps to protect its customer's security and online reputation. It helps offer customers greater assurance while doing transactions.

What is an encryption key?

An encryption key is a digital file used to control the encryption (and sometimes decryption) of data. The use of an encryption key and an encryption protocol (like SSL/TLS) turns plain text into cipher text, allowing for secure transmission of data. The strength of encryption keys is measured in bits (2048-bit, 4096-bit, etc).

What is the SHA-1 and SHA-2 algorithms?

SHA stands for Secure Hash Algorithm.SHA-1 Algorithm: SHA-1 is a cryptographic hash function that delivers security with its 160-Bit hash value. Is carries a 40 digit-long hexadecimal number (SHA-1 is now obsolete). SHA-2 Algorithm: SHA-2 is a cryptographic hash function that carries hash values of 224, 256, 384 and 512-Bits. This is the new industry standard and highly recommended.

What browser recognition is required

Browser recognition or ubiquity refers to the approximate percentage of Internet users that will inherently trust an SSL certificate. The rule of thumb for a commercial site is an SSL certificate with more than 95% browser ubiquity. Certificate Authorities who own their own roots have Root CA Certificates that are added into releases of all the major browsers such as Internet Explorer, Netscape, Opera, etc… by the browser vendor (such as Microsoft). Browsers automatically rely on a list of root CA certificates that the browser vendor has deemed trustworthy. SSL certificates issued by a trusted root CA are inherently trusted by the browser and the gold padlock will appear transparently during secure sessions. When a browser 'sees' a website using an SSL certificate issued by a CA root it does not trust, the website visitor will see a warning message. Obviously for maximum reach you want the highest number of online users to trust your SSL certificate.

Comodo SSL Secure Certificate

Features and Benefits
Global Certificate Authority (CA)
Facilitates Encryption up to 256-bit.
Strong SHA-2
RSA Signature key 2048-bit encryption
Fully Qualified Domain Name (FQDN) and
HTTPS connection and removes the “Not Secure” warning.
Hacker Guardian PCI Scanning
Hacker Proof Trust Mark
Boosts Google® ranking

We are ready to assist you Contact us now