Public Key Infrastructure (PKI)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

flashcard set

Earn XP

Description and Tags

sy0-701 1.4

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

PKI

Policies, procedures, hardware, software and people responsible for the creation, distribution, management, storing and revoking of digital certs.

Lots of planning required to determine the encryption and methods used within the organization.

May also be used to describe public keys bound to people or devices by the cert authority.

2
New cards

Symmetric encryption

Decryption uses same key used to encrypt info

Referred to as secret key algorithm or shared secret

(-) Does not scale well above 10 people or devices

(+) Very fast (less overhead than asymmetric encryption)

May be combined with asymmetric encryption

3
New cards

Asymmetric cencrypion

Rusty and Hank are both given wwo or more mathematically related keys (cannot gain the other key through reverse engineering)

A private (only one person/device has access) and public key (for anyone to use)

Private key decrypts and public key encrypts

4
New cards

Public key crypto

Large random number used to generate both keys

One is designated as public and the other private

Private key is protected through password

5
New cards

asymmetric encryption process

Rusty has public key given by Hank

Rusty uses public key and encryption software to convert the plaintext data into encrypted ciphertext

Rusty’s ciphertext is sent to Hank

Hank uses private key to decrypt ciphertext

6
New cards

Key escrow

Someone else (3rd party software) holds decryption keys or keys are stored locally

Handing keys off to another person may be required to maintain uptime and availability of organization’s data.