10.1.5 - Digital Certificates and PKI

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Flashcards about Digital Certificates and PKI

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

When you want others to send you confidential messages, what do you provide?

You give them your public key to use to encrypt the message.

2
New cards

What key can decrypt a message encrypted with your public key?

Only your private key.

3
New cards

When you want to authenticate yourself to others, what do you create?

Creates a signature using your private key.

4
New cards

What do others use your public key for when you want to authenticate?

Validate the signature.

5
New cards

What protocol can be used with smart cards?

A protocol such as Kerberos can be used with smart cards.

6
New cards

What problem does public key cryptography or asymmetric encryption solve?

It solves the problem of distributing encryption keys when you want to communicate securely with others, authenticate a message, or authenticate yourself to an access control system.

7
New cards

What should happen to the private key in asymmetric encryption?

Remains a secret that only you know.

8
New cards

What is the relationship between the private key and the public key in asymmetric encryption?

Cannot be derived from the public key.

9
New cards

How is a public key typically used rather than encrypting the whole message?

Encrypt a symmetric encryption key for use in a single session and exchange it securely.

10
New cards

What type of cipher is used when the key can perform both encryption and decryption?

The same key can perform both encryption and decryption.

11
New cards

What is the basic problem with public key cryptography?

Proving the identity of the owner of a public key.

12
New cards

What is the aim of public key infrastructure (PKI)?

To prove that the owners of public keys are who they say they are.

13
New cards

Under PKI, what should anyone distributing public keys obtain?

Obtain a digital certificate.

14
New cards

What does a certificate authority (CA) do?

Guarantees the validity of the certificate.

15
New cards

What is a digital certificate essentially?

A wrapper for a subject's (or end entity's) public key.

16
New cards

Give an example of when a self-signed certifcate can be used?

The web administrative interfaces of SOHO routers are often only protected by a self-signed certificate.

17
New cards

When shouldn't self-signed certificates be used?

They should not be used to protect critical hosts and applications.