Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:46 AM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

6 Terms

1
New cards

Public Key Infrastructure (PKI)

• Policies, procedures, hardware, software, people

- Digital certificates: create, distribute, manage, store, revoke

• This is a big, big, endeavor

- Lots of planning

• Also refers to the binding of public keys to people

or devices

- The certificate authority

- It's all about trust

2
New cards

Symmetric encryption

-A single, shared key

-Encrypt with the key

-Decrypt with the same key

-If it gets out, you'll need another key

-Secret key algorithm

-A shared secret

-Doesn't scale very well

-Can be challenging to distribute

-Very fast to use

-Less overhead than asymmetric encryption

-Often combined with asymmetric encryption

3
New cards

Asymetric Encryption

Public key cryptography

- Two or more mathematically related keys

Private key

- Keep this private

Public key

- Seen and used by anyone

- Give it away

The private key is the only key that can decrypt data encrypted with the public key

- You can't derive the private key from the public key

4
New cards

The key pair

• Asymmetric encryption

- Public Key Cryptography

• Key generation

- Build both the public and private key at the same

time

- Lots of randomization

- Large prime numbers

- Lots and lots of math

• Everyone can have the public key

- Only Alice has the private key

5
New cards

Asymmetric Encryption

knowt flashcard image
6
New cards

Key escrow

Someone else holds your decryption keys

- Your private keys are in the hands of a 3rd party

- This may be within your own organization

This can be a legitamate business organization

- A business might need access to employee info

- Government agencies need to decrypt partner data

Controversial?

- Of course

- But still may be required

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)