HTTPS FAQs

HTTPS at Google

What is encryption?

Encryption is the modern-day method of protecting electronic information, just as safes and combination locks protected information on paper in the past. Encryption is a technological implementation of cryptography: information is converted to an unintelligible form—encoded—such that it can only be translated into an understandable form—decoded—with a key. For example, in the case of device encryption, the code is broken with a PIN that unscrambles information or a complex algorithm given clear instructions by a program or device. Encryption effectively relies on math to code and decode information.

What is HTTPS?

HTTP—hypertext transfer protocol—is the technical means by which our browsers connect to websites. HTTPS is an encrypted HTTP connection, making it more secure. You can tell if your connection to a website is secure if you see HTTPS rather than HTTP in the URL. Most browsers also have an icon that indicates a secure connection—for example, Chrome displays a green lock.

Why should I use HTTPS?

You should protect your website with HTTPS, even if it doesn’t handle sensitive communications. HTTPS protects the integrity of your website and the privacy and security of your users. Also, powerful new web platform features are restricted to sites offering HTTPS.

What is Google's HTTPS goal?

We believe that strong encryption is fundamental to the safety and security of all users of the web. Thus, we’re working to support encryption in all of our products and services. The HTTPS at Google page shows our real-time progress toward that goal.

Why is encryption important?

Our communications travel across a complex network of networks in order to get from point A to point B. Throughout that journey they are susceptible to interception by unintended recipients who know how to manipulate the networks. Similarly, we’ve come to rely on portable devices that are more than just phones—they contain our photos, records of communications, emails, and private data stored in apps we permanently sign into for convenience. Loss or theft of a device means we’re vulnerable to someone gaining access to our most private information, putting us at risk for identity theft, financial fraud, and personal harm.

Encryption protects us in these scenarios. Encrypted communications traveling across the web may be intercepted, but their contents will be unintelligible. This is known as “ciphertext,” whereas unencrypted messages travel in “plaintext”. As for device encryption, without the PIN or code necessary to decrypt an encrypted device, a would-be thief cannot gain access to the contents on a phone and can only wipe a device entirely. Losing data is a pain, but it’s better than losing control over your identity.

What are some types of encryption?

Encryption in transit protects the flow of information from the end user to a third-party’s servers. For example, when you are on a shopping site and you enter your credit card credentials, a secure connection protects your information from interception by a third party along the way. Only you and the server you connect to can decrypt the information.

End-to-end encryption means that only the sender and recipients hold the keys to encrypt and decrypt messages. The service provider who controls the system through which the users communicate has no way of accessing the actual content of messages.

Encryption at rest protects information when it is not in transit. For example, the hard disk in your computer may use encryption at rest to make sure that someone cannot access files if your computer was stolen.

What protocols are included in these charts?

These charts represent requests made over HTTP, HTTP/2, HTTPS, SPDY, and QUIC.

What protocols are considered encrypted?

Requests made over HTTPS, SPDY, and QUIC are considered encrypted because they incorporate TLS by default. HTTP/2 is also included, since Google does not support unencrypted HTTP/2 connections.

Where can I find data about other protocols?

We currently publish data on TLS usage in Gmail's mail protocols. Other protocols that are not listed above are currently out of the scope of this report

Do you have accurate data before December 2013?

Unfortunately not - our data sources prior to December 2013 are not accurate enough to rely upon for measuring HTTPS adoption.

How do you measure HTTPS usage data?

Data is provided by Chrome users who choose to share usage statistics. Country/region categorization is based on the IP address associated with a user's browser.

Why are these 10 countries/regions chosen for HTTPS usage statistics?

To compare HTTPS usage around the world, we selected 10 countries/regions with sizable populations of Chrome users from different geographic regions.

 

HTTPS on top sites [archived]

What is meant by "Site works on HTTPS"?

The site is considered to work on HTTPS if the Googlebot successfully reaches https://domain and isn’t redirected through a HTTP location.

What is meant by "Modern TLS config"?

As of February 2016, we assess that sites are offering modern HTTPS if they offer TLS v1.2 with a cipher suite that uses an AEAD mode of operation:

  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

What is meant by "Default HTTPS"?

Default HTTPS means that the site redirects HTTP requests to a HTTPS URL. Note that it is possible for this to be true, while at the same time the site rejects HTTPS requests to the domain (e.g. http://domain redirects to https://subdomain.domain, but https://domain refuses the connection).
It's also important to note that even if a site is marked as having Default HTTPS, it does not guarantee that all traffic on every page of that site will be over HTTPSChrome advises on the HTTPS state on every page that you visit. If you use another browser, you should ensure that you are familiar with the way your browser displays different HTTPS states.

What are your data sources?

We have used a mix of public data (e.g. Alexa Top sites) and Google data. The data was collected over a few months in early 2016 and forms the basis of this list.

Is this list ordered in terms of popularity?

No. The list contains the Top 100 non-Google sites, presented in alphabetical order, divided into three categories of HTTPS adoption.

I'm a website owner, my site is on this list and I need assistance in moving to HTTPS. Is Google offering to help?

We are offering limited support to sites on this list to make the move. Please check your security@domain email address for further information or reach out to us at security@google.com.

 

Main menu
6498478004042711568
true
Search Help Center
true
true
true
false
false