Encryption Protocols & Digital Certificates

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 11

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

12 Terms

1
Encryption Protocols
Methods that secure communication over the internet by allowing parties to identify, verify, and communicate confidentially.
New cards
2
SSL/TLS Connection
A secure connection initiated between a client and server, beginning with a handshake.
New cards
3
Digital Certificate
A certificate issued by a Certificate Authority that verifies an organization’s identity and includes their public key.
New cards
4
Public Key
A cryptographic key that can be shared publicly and is used to encrypt messages that only the corresponding private key can decrypt.
New cards
5
Certificate Authority (CA)
An entity that issues digital certificates and verifies the identities of organizations.
New cards
6
Digital Signature
A hashed message, encrypted with the sender's private key, that verifies the authenticity and integrity of the message.
New cards
7
Hashing Algorithm
A function that converts input data into a fixed-length string, creating a digest for integrity verification.
New cards
8
Symmetric Session Keys
Keys used for encrypting data during the session established after an SSL/TLS handshake.
New cards
9
Handshake
The initial process where two parties establish a secure connection, exchanging information to confirm identities.
New cards
10
Use Cases of Encryption Protocols
Scenarios like transmitting passwords, session cookies, and conducting online shopping or banking securely.
New cards
11

How does an SSL/TLS connection work during initiation?

An SSL/TLS connection is initiated when a client contacts a server, starting with a handshake. The server sends its digital certificate and public key for the client to confirm its identity. They then agree on an encryption algorithm and generate symmetric session keys.

New cards
12

What is a Digital Signature process and verification method?

A digital signature is created by hashing a message to produce a digest, which is then encrypted with the sender's private key. Upon receipt, the message and digital signature are decrypted with the receiver's private key, and the digital signature is decrypted with the sender's public key. The decrypted message is hashed again to produce a new digest. If the new digest matches the original, the message integrity is confirmed.

New cards

Explore top notes

note Note
studied byStudied by 25 people
951 days ago
5.0(1)
note Note
studied byStudied by 27 people
884 days ago
5.0(1)
note Note
studied byStudied by 141 people
830 days ago
5.0(1)
note Note
studied byStudied by 2783 people
1359 days ago
5.0(3)
note Note
studied byStudied by 20 people
955 days ago
5.0(1)
note Note
studied byStudied by 1 person
43 days ago
4.0(1)
note Note
studied byStudied by 12 people
966 days ago
5.0(1)
note Note
studied byStudied by 66 people
784 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (45)
studied byStudied by 96 people
542 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 26 people
756 days ago
5.0(2)
flashcards Flashcard (39)
studied byStudied by 866 people
846 days ago
4.9(44)
flashcards Flashcard (39)
studied byStudied by 33 people
789 days ago
5.0(4)
flashcards Flashcard (35)
studied byStudied by 4 people
665 days ago
5.0(3)
flashcards Flashcard (26)
studied byStudied by 3 people
837 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 21 people
546 days ago
5.0(1)
flashcards Flashcard (342)
studied byStudied by 28427 people
414 days ago
4.5(133)
robot