Module 4: Adavanced Cryptography

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:25 PM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

62 Terms

1
New cards

Digital Signature

A technology used to prove a document originated from a valid sender.

2
New cards

Weakness of Digital Signature

It can only prove that the private key of the sender was used to encrypt the signature.

3
New cards

Weakness of Digital Signature

An imposter could post a public key under a sender's name.

4
New cards

Digital Certificate

A technology used to associate a user's identity to a public key that has been "digitally signed" by a trusted third party.

5
New cards

Certificate Authority (CA)

An entity used to manage digital certificates.

6
New cards

Registration Authority (RA)

An entity responsible for verifying the authenticity of the user during a certificate request.

7
New cards

Certificate Signing Request (CSR) Generation

The process where a certificate request is processed and a digital certificate is issued after verification.

8
New cards

Intermediate Certificate Authority (CA)

Subordinate entities designed to handle specific CA tasks, such as processing certificate requests and verifying the identity of the individual.

9
New cards

Certificate Request Authentication Methods

These include verification via email, documents, or in person.

10
New cards

Certificate Repository (CR)

A publicly accessible centralized directory of digital certificates used to view certificate status.

11
New cards

Certificate Repository (CR) Management

This directory can be managed locally by setting it up as a storage area connected to the CA server.

12
New cards

Certificate Revocation Circumstances

Reasons for revocation include a certificate no longer being used, details of the certificate changing (such as user address), or a private key being lost or exposed.

13
New cards

Certificate Revocation List (CRL)

A list of digital certificates that have been revoked.

14
New cards

Online Certificate Status Protocol (OCSP)

A protocol that performs a real-time lookup of a certificate's status.

15
New cards

OCSP Responder

A trusted entity to which a browser sends certificate information to receive immediate revocation information.

16
New cards

OCSP Stapling

A variation of OCSP where web servers query the OCSP Responder at regular intervals to receive a signed, time-stamped response.

17
New cards

Certificate Chaining

The process used to verify that a digital certificate is genuine.

18
New cards

Root Digital Certificate

The beginning point of a certificate chain, which is self-signed, created and verified by a CA, and does not depend on higher-level authorities.

19
New cards

User Digital Certificate

The endpoint of a certificate chain.

20
New cards

Web Server Digital Certificate Functions

These ensure the authenticity of the web server to the client and ensure the authenticity of the cryptographic connection to the web server.

21
New cards

Domain Digital Certificate Types

Common types include domain validation, extended validation (EV), wildcard, and subject alternative name (SAN) certificates.

22
New cards

Machine/Computer Digital Certificate

A specific type of digital certificate relating to hardware.

23
New cards

Code Signing Digital Certificate

A specific type of digital certificate relating to software.

24
New cards

Email Digital Certificate

A specific type of digital certificate relating to software for securing email.

25
New cards

X.509 Version 3

The standard format for digital certificates.

26
New cards

X.509 Digital Certificate Attributes

These include the certificate validity period, end-host identity information, encryption keys for secure communications, the signature of the issuing CA, and the common name (CN) of the protected device.

27
New cards

Public Key Infrastructure (PKI)

A framework for all entities involved in digital certificates.

28
New cards

Public Key Infrastructure (PKI) Components

The set of software, hardware, processes, procedures, and policies needed to create, manage, distribute, use, store, and revoke digital certificates across large user populations.

29
New cards

Trust

Confidence in or reliance on another person or entity.

30
New cards

Trust Model

Refers to the type of trust relationship that can exist between individuals and entities.

31
New cards

Direct Trust

A trust model where one person knows the other person.

32
New cards

Third-party Trust

A situation where two individuals trust each other because each trusts a third party.

33
New cards

Web of Trust Model

A model based on direct trust where each user signs a digital certificate and then exchanges certificates with all other users.

34
New cards

Hierarchical Trust Model

A model that assigns a single hierarchy with one master CA called the root, which signs all digital certificate authorities with a single key.

35
New cards

Distributed Trust Model

A model with multiple CAs that sign digital certificates to eliminate the limitations of the hierarchical trust model.

36
New cards

Bridge Trust Model

A model where one CA acts as a facilitator to interconnect all other CAs, allowing different trust models to be linked together.

37
New cards

Certificate Policy (CP)

A published set of rules governing the operation of a PKI and providing recommended baseline security requirements.

38
New cards

Certificate Practice Statement

A technical document describing in detail how the CA uses and manages certificates, including registration, issuance, and revocation.

39
New cards

Certificate Life Cycle

Typically divided into four parts

40
New cards

Public Key Storage

Public keys can be stored by embedding them within digital certificates.

41
New cards

Private Key Storage

Private keys can be stored on the user's local system (software-based) or in hardware such as smart-cards or tokens.

42
New cards

Dual Key Pairs (Encryption)

One pair used to encrypt information, where the public key can be backed up to another location.

43
New cards

Dual Key Pairs (Digital Signatures)

A pair used only for digital signatures, where the public key is never backed up.

44
New cards

Key Management Procedures

Standard procedures include escrow, expiration, renewal, revocation, recovery, suspension, and destruction.

45
New cards

M-of-N Control

A key management control illustrated by splitting key parts among several users.

46
New cards

Tunneling

A process used by cryptographic protocols that relies on "encapsulating" or enveloping the data to be transmitted inside something else.

47
New cards

Transport Layer Security (TLS)

A replacement for Secure Sockets Layer (SSL) that provides a higher degree of protection; the current version is TLS v1.3.

48
New cards

Cipher Suite

A named combination of the encryption, authentication, and message authentication code (MAC) algorithms used with TLS.

49
New cards

IP Security (IPSec)

A protocol suite for securing IP communications that is transparent to applications, users, and software.

50
New cards

IPSec Protection Areas

These correspond to three protocols

51
New cards

IPSec Encryption Modes

These include transport mode and tunnel mode.

52
New cards

Robustness of IPSec

IPSec is considered more robust than TLS because it protects IP, the basis for all other TCP/IP protocols.

53
New cards

Hypertext Transport Protocol Secure (HTTPS)

Plain HTTP sent over TLS using port 443.

54
New cards

Secure Shell (SSH)

An encrypted alternative to the Telnet protocol used to access remote computers.

55
New cards

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A protocol for securing email messages.

56
New cards

Secure Real-time Transport Protocol (SRTP)

A secure extension protecting transmission using the Real-Time Transport Protocol (RTP).

57
New cards

Cryptographic Key

A value that serves as input to an algorithm to transform plaintext into ciphertext and vice versa.

58
New cards

Key Strength

The resiliency of a key to attacks, determined by randomness, cryptoperiod, and key length.

59
New cards

Cryptoperiod

The length of time for which a key is authorized for use.

60
New cards

Block Cipher

An algorithm that manipulates an entire block of plaintext at one time, encrypting each block independently.

61
New cards

Block Cipher Mode of Operation

Specifies how block ciphers should handle blocks of plaintext.

62
New cards

Common Block Cipher Modes

These include Electronic Code Book (ECB), Cipher Block Chaining (CBC), Counter (CTR), and Galois/Counter (GCM)