HTTPS at Google

What is encryption?

Encryption is the modern-day method of protecting electronic information, just as safes and combination locks protected information on paper in the past. Encryption is a technological implementation of cryptography: information is converted to an unintelligible form—encoded—such that it can only be translated into an understandable form—decoded—with a key. For example, in the case of device encryption, the code is broken with a PIN that unscrambles information or a complex algorithm given clear instructions by a program or device. Encryption effectively relies on math to code and decode information.

What is HTTPS?

HTTP—hypertext transfer protocol—is the technical means by which our browsers connect to websites. HTTPS is an encrypted HTTP connection, making it more secure. You can tell if your connection to a website is secure if you see HTTPS rather than HTTP in the URL. Most browsers also have an icon that indicates a secure connection—for example, Chrome displays a green lock.

Why should I use HTTPS?

You should protect your website with HTTPS, even if it doesn’t handle sensitive communications. HTTPS protects the integrity of your website and the privacy and security of your users. Also, powerful new web platform features are restricted to sites offering HTTPS.

What is Google's HTTPS goal?

We believe that strong encryption is fundamental to the safety and security of all users of the web. Thus, we’re working to support encryption in all of our products and services. The HTTPS at Google page shows our real-time progress toward that goal.

Why is encryption important?

Our communications travel across a complex network of networks in order to get from point A to point B. Throughout that journey they are susceptible to interception by unintended recipients who know how to manipulate the networks. Similarly, we’ve come to rely on portable devices that are more than just phones—they contain our photos, records of communications, emails, and private data stored in apps we permanently sign into for convenience. Loss or theft of a device means we’re vulnerable to someone gaining access to our most private information, putting us at risk for identity theft, financial fraud, and personal harm.

Encryption protects us in these scenarios. Encrypted communications traveling across the web may be intercepted, but their contents will be unintelligible. This is known as “ciphertext,” whereas unencrypted messages travel in “plaintext”. As for device encryption, without the PIN or code necessary to decrypt an encrypted device, a would-be thief cannot gain access to the contents on a phone and can only wipe a device entirely. Losing data is a pain, but it’s better than losing control over your identity.

What are some types of encryption?

Encryption in transit protects the flow of information from the end user to a third-party’s servers. For example, when you are on a shopping site and you enter your credit card credentials, a secure connection protects your information from interception by a third party along the way. Only you and the server you connect to can decrypt the information.

End-to-end encryption means that only the sender and recipients hold the keys to encrypt and decrypt messages. The service provider who controls the system through which the users communicate has no way of accessing the actual content of messages.

Encryption at rest protects information when it is not in transit. For example, the hard disk in your computer may use encryption at rest to make sure that someone cannot access files if your computer was stolen.

What protocols are included in these charts?

These charts represent requests made over HTTP, HTTP/2, HTTPS, SPDY, and QUIC.

What protocols are considered encrypted?

Requests made over HTTPS, SPDY, and QUIC are considered encrypted because they incorporate TLS by default. HTTP/2 is also included, since Google does not support unencrypted HTTP/2 connections.

Where can I find data about other protocols?

We currently publish data on TLS usage in Gmail's mail protocols. Other protocols that are not listed above are currently out of the scope of this report.

Why isn't Google Search included in the products graph?

Google Search shares serving infrastructure with several other products at Google. If we separated out Google Search into its own category, due to the sharing of serving infrastructure, we would not have confidence in the accuracy of that data.

Do you have accurate data before December 2013?

Unfortunately not - our data sources prior to December 2013 are not accurate enough to rely upon for measuring HTTPS adoption.

How do you measure HTTPS usage data?

Data is provided by Chrome users who choose to share usage statistics. Country/region categorization is based on the IP address associated with a user's browser.

Why are these 10 countries/regions chosen for HTTPS usage statistics?

To compare HTTPS usage around the world, we selected 10 countries/regions with sizable populations of Chrome users from different geographic regions.


HTTPS on top sites [archived]

What is meant by "Site works on HTTPS"?

The site is considered to work on HTTPS if the Googlebot successfully reaches https://domain and isn’t redirected through a HTTP location.

What is meant by "Modern TLS config"?

As of February 2016, we assess that sites are offering modern HTTPS if they offer TLS v1.2 with a cipher suite that uses an AEAD mode of operation:


What is meant by "Default HTTPS"?

Default HTTPS means that the site redirects HTTP requests to a HTTPS URL. Note that it is possible for this to be true, while at the same time the site rejects HTTPS requests to the domain (e.g. http://domain redirects to https://subdomain.domain, but https://domain refuses the connection).
It's also important to note that even if a site is marked as having Default HTTPS, it does not guarantee that all traffic on every page of that site will be over HTTPSChrome advises on the HTTPS state on every page that you visit. If you use another browser, you should ensure that you are familiar with the way your browser displays different HTTPS states.

What are your data sources?

We have used a mix of public data (e.g. Alexa Top sites) and Google data. The data was collected over a few months in early 2016 and forms the basis of this list.

Is this list ordered in terms of popularity?

No. The list contains the Top 100 non-Google sites, presented in alphabetical order, divided into three categories of HTTPS adoption.

I'm a website owner, my site is on this list and I need assistance in moving to HTTPS. Is Google offering to help?

We are offering limited support to sites on this list to make the move. Please check your security@domain email address for further information or reach out to us at


Certificate Transparency

What is a certificate authority?

A Certificate Authority (CA) is an organization that issues digital certificates to website operators. Operating systems (e.g., Mac OS X and Windows) and web browsers (e.g., Chrome, Firefox, Safari) ship with a pre-loaded set of trusted root authorities. Modern operating systems typically ship with over 200 trusted CAs, some of which are operated by governments. Each CA is trusted equally by web browsers. In addition, many CAs delegate the ability to issue certificates to intermediate Certificate Authorities.

What is a certificate?

When you visit a website over a secure connection (HTTPS), the website provides a digital certificate to your browser. This certificate identifies the hostname of the site and is signed by the Certificate Authority (CA) that has verified the site owner. The proof of identity represented in a Certificate may be trusted by the user as long as the user trusts the Certificate Authority.

Why is certificate transparency important?

The current model requires all users to trust that the hundreds of CA organizations will correctly issue certificates for any site. But there are sometimes cases where human error or impersonation can lead to mis-issuance of certificates. Certificate Transparency (CT) changes the issuance process to require that certificates be written to publicly verifiable, tamper-proof, append-only logs in order to be considered valid by the user's web browser. By requiring the certificates be written to these public CT logs, any interested party can examine all certificates issued by an authority. This in turn increases accountability for organizations, fostering a more reliable system. Eventually, browsers may not show the secure connection padlock when visiting a site with HTTPS unless the site's certificate has been logged in CT Logs.

Note that only the organization responsible for a given domain can know which certificates issued are authorized. If a certificate is not authorized, the domain user should follow up with the CA that issued it to determine appropriate steps.

What is a certificate transparency log?

A Certificate Transparency log is a server that implements RFC 6962, allowing any party to submit certificates that have been issued by a publicly trusted CA. Once a log accepts a certificate, the cryptographic properties of the log guarantee that the entry can never be removed or edited.

Where do the certificates shown here come from?

The certificates on the Transparency Report are retrieved from the set of active certificate transparency logs. Many of the certificates in those logs are submitted by CAs during the issuance process. In addition, we add certificates that Google encounters when indexing the web. Site owners can search this site for domain names they control to ensure there has been no mis-issuance of certificates referencing their domains.

Why doesn't my certificate appear here?

Certificates appear here when they have been logged in at least one CT log. You can submit your own certificates to a log, though if that doesn’t work you may need to contact your CA. Technical users can submit certificates to logs themselves, using tools such as the open-source tools provided at

Why do some sites have more than one certificate issuer?

Many large organizations use more than one CA to address a diverse set of needs, which may include contractual obligations, implementation considerations and costs.

Why do some certificates list more than one DNS name?

Many organizations choose to issue a single certificate that is used across multiple sites. For example, large sites frequently use multiple subdomains for their properties (e.g.,, but use a single certificate naming all those subdomains.


Google apps
Main menu
Search Help Center