Overview of Public Key Infrastructure and Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Public Key Infrastructure (PKI)

A framework for managing digital certificates and public-key encryption.

2
New cards

Public Key

A cryptographic key that is shared openly and used for encryption or verifying signatures.

3
New cards

Private Key

A secret key that is kept confidential and used for decrypting data or creating digital signatures.

4
New cards

Key Escrow

A process where cryptographic keys are stored by a trusted third party for emergency access.

5
New cards

Encryption

The process of converting data into a coded format to prevent unauthorized access.

6
New cards

Level

Various levels of encryption applied to different aspects of data storage and communication.

7
New cards

Transport/Communication

Securing data during transmission between devices or networks.

8
New cards

Asymmetric Encryption

Encryption method using pairs of keys: public and private keys.

9
New cards

Symmetric Encryption

Encryption method using a single key for both encryption and decryption.

10
New cards

Key Exchange

Process of securely sharing cryptographic keys between parties.

11
New cards

Algorithms

Mathematical formulas used for encryption and decryption.

12
New cards

Key Length

The size of the cryptographic key, influencing the strength of encryption.

13
New cards

Trusted Platform Module (TPM)

Hardware component for securely storing cryptographic keys and performing cryptographic operations.

14
New cards

Hardware Security Module (HSM)

Dedicated hardware device for managing, storing, and processing cryptographic keys securely.

15
New cards

Key Management System

Software or hardware solution for generating, storing, and distributing cryptographic keys.

16
New cards

Secure Enclave

Isolated hardware or software environment for secure processing of sensitive data.

17
New cards

Steganography

Concealing data within other data to hide its existence.

18
New cards

Tokenization

Substituting sensitive data with non-sensitive placeholders.

19
New cards

Data Masking

Concealing or anonymizing specific data elements within a dataset.

20
New cards

Hashing

Generating a fixed-size, unique hash value from input data using cryptographic algorithms.

21
New cards

Salting

Adding random data to input before hashing to prevent identical inputs from producing the same hash.

22
New cards

Digital Signatures

Cryptographic signatures that verify the authenticity and integrity of digital messages or documents.

23
New cards

Key Stretching

Technique to increase the computational effort required to derive keys from passwords.

24
New cards

Blockchain

Distributed, decentralized ledger technology used for secure and transparent record-keeping.

25
New cards

Open Public Ledger

Transparent and publicly accessible record of transactions or data entries.

26
New cards

Certificates

Digital documents used to authenticate the identity of users, devices, or organizations.

27
New cards

Certificate Authorities

Entities that issue and manage digital certificates.

28
New cards

Certificate Revocation Lists (CRLs)

Lists of revoked or compromised digital certificates.

29
New cards

Online Certificate Status Protocol (OCSP)

Protocol for checking the revocation status of digital certificates in real-time.

30
New cards

Self-signed

Digital certificates signed by their own issuer.

31
New cards

Third-party

Digital certificates issued by a trusted third-party CA.

32
New cards

Root of Trust

A trusted entity or component from which cryptographic operations and trust relationships originate.

33
New cards

Certificate Signing Request (CSR) Generation

Process of requesting a digital certificate from a CA.

34
New cards

Wildcard

A digital certificate that can secure multiple subdomains of a domain.