L18-Certificate-TLS

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:50 AM on 11/16/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

Public Key Cryptography

A cryptographic system that uses pairs of keys: a public key, which can be shared openly, and a private key, which is kept secret by the owner.

2
New cards

Digital Signatures

A mathematical scheme for verifying the authenticity and integrity of a message, signable only with a private key, but verifiable by anyone with the corresponding public key.

3
New cards

Man-in-the-Middle (MITM) Attack

A security breach where a third party intercepts and potentially alters communication between two parties who believe they are directly communicating with each other.

4
New cards

Certificate Authority (CA)

A trusted entity that issues digital certificates for use in public key cryptography, verifying the ownership of public keys.

5
New cards

Certificate

A document that confirms the ownership of a public key and is issued by a Certificate Authority.

6
New cards

Hierarchical Trust

A system where trust is delegated down a chain from a trust anchor or root certificate authority to subordinate authorities or certificates.

7
New cards

Public Key Infrastructure (PKI)

A framework that provides the necessary services to create, manage, distribute, and revoke digital certificates.

8
New cards

Session Key

A temporary symmetric key used for encrypting messages between a client and server during a single session, established after the TLS handshake.

9
New cards

Transport Layer Security (TLS)

A cryptographic protocol designed to provide communications security over a computer network, ensuring encryption, integrity, and authentication.

10
New cards

SSLstrip Attack

A type of attack that forces a user to connect to an unsecured HTTP version of a site, thus bypassing HTTPS security.

11
New cards

Confidentiality

A security principle ensuring that information is accessible only to those authorized to have access.

12
New cards

Integrity

The assurance that the information being transferred has not been altered during transmission.

13
New cards

Authentication

Verifying the identity of a person or device, often using cryptographic techniques such as digital signatures.

14
New cards

Non-Repudiation

A guarantee that someone cannot deny the validity of their signature on a document or a message.

15
New cards

Enciphered Text

Text that has been transformed into a cipher to prevent unauthorized access.

16
New cards

RSA

A widely used asymmetric encryption algorithm that relies on the mathematical difficulty of factoring large numbers.

17
New cards

Key Exchange Algorithm

A method by which cryptographic keys are exchanged between users, ensuring secure communication.

18
New cards

Symmetric Encryption

An encryption method where the same key is used for both encryption and decryption.

19
New cards

Asymmetric Encryption

An encryption method where different keys are used for encryption (public key) and decryption (private key).

20
New cards

Denial of Service Attack

An attempt to make a machine or network resource unavailable to its intended users by overwhelming it with requests.