Logo
HTTPS Glossary
Overview

HTTPS Glossary

Apr 18, 2026
3 min read

Terms and Abbreviations

TermStands ForWhat It Means
AEADAuthenticated Encryption with Associated DataA cipher mode that encrypts and integrity-checks data in a single operation. AES-GCM and ChaCha20-Poly1305 are examples.
AES-GCMAdvanced Encryption Standard, Galois/Counter ModeA symmetric AEAD cipher used for bulk data encryption in TLS. Hardware-accelerated on modern CPUs.
ARPAddress Resolution ProtocolMaps IP addresses to MAC addresses on a local network. ARP spoofing poisons a device’s ARP cache to redirect traffic.
BGPBorder Gateway ProtocolThe routing protocol between autonomous systems on the internet. BGP hijacking reroutes entire IP prefixes.
CACertificate AuthorityA trusted organization (e.g., DigiCert, Let’s Encrypt) that issues X.509 certificates after verifying domain ownership.
CRLCertificate Revocation ListA CA-published list of certificates revoked before expiry, typically due to key compromise.
CTCertificate TransparencyA public append-only log system where CAs must record every certificate they issue.
ECHEncrypted Client HelloA TLS extension that encrypts the ClientHello, hiding SNI and server identity from network observers.
ECDHEElliptic Curve Diffie-Hellman EphemeralA key agreement scheme using elliptic curve math. The E (ephemeral) means fresh keys are generated per session, enabling PFS.
HKDFHMAC-based Key Derivation FunctionUsed in TLS 1.3 to derive multiple keys from a shared secret. Replaces the PRF-based scheme from TLS 1.2.
HMACHash-based Message Authentication CodeA MAC computed using a hash function and a secret key. Used in TLS Finished messages to prove both parties derived the same keys.
HSTSHTTP Strict Transport SecurityA response header instructing browsers to always use HTTPS for a domain. Prevents SSL stripping on subsequent visits.
MITMMan-in-the-MiddleAn attack where a third party secretly intercepts and potentially modifies communication between two parties.
OCSPOnline Certificate Status ProtocolA protocol for real-time certificate revocation checks. OCSP stapling lets the server include a pre-fetched response in the handshake.
PFSPerfect Forward SecrecyThe property that compromise of a long-term private key cannot decrypt previously recorded sessions, because each session used ephemeral keys that no longer exist.
PRFPseudorandom FunctionA deterministic function producing output indistinguishable from random. Used in TLS 1.2 to derive session keys.
RFCRequest for CommentsIETF standards documents. TLS 1.2 is RFC 5246; TLS 1.3 is RFC 8446.
RSARivest-Shamir-AdlemanA public-key cryptosystem used for server authentication in TLS. TLS 1.3 removed RSA key exchange.
RTTRound Trip TimeTime for a message to travel from sender to receiver and back. TLS 1.2 adds 2 RTTs; TLS 1.3 adds 1.
SANSubject Alternative NameAn X.509 certificate field listing domain names the certificate covers.
SNIServer Name IndicationA TLS extension where the client announces the target hostname in ClientHello. Allows one IP to host multiple certificates.
SSLSecure Sockets LayerThe predecessor to TLS. SSL 2.0 and 3.0 are deprecated and broken. The protocol in use today is always TLS.