05 Public Key Infrastructure (PKI) and TLS_SSL

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:49 AM on 1/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

Public Key Infrastructure; a system to generate and manage public and private keys

PKI

2
New cards

Using asymmetric encryption to generate or create then encrypt a key for use in symmetric encryption

Electronic Key Exchange

3
New cards

Any communications attack where a third part intercepts communications then passes them on the the legitimate receiver

Man in the Middle (MitM)

4
New cards

Used in PKI; verifies identity of sender wanting a digital key pair

Registration Authority (RA)

5
New cards

Issuer of asymmetric key pair in a PKI; digitally signs the public key certificate; may be part of a CA chain

Certificate Authority (CA)

6
New cards

Any server hosting public key certificates; often hosted by the CA

Public Key Repository

7
New cards

Allows for Subject Alternate Names (SANs); can secure multiple domains, sites and subdomains with one certificate

Multi-Domain Certificate

8
New cards

SSL was the original standard for using public key certs - created by Netscape; SSL is now TLS

TLS/SSL

9
New cards

The combination of specific kinds of asymmetric encryption, symmetric encryption, and hashing to be used between a browser and a web site for secure (https) communications

Cipher Suite

10
New cards

Certificate will only work between these dates; shouldn't be a long time

Certificate Valid Dates

11
New cards

The standard used for digital certificates; old

X509

12
New cards

Used to identify certificates

Certificate Serial Number

13
New cards

Shows the type of hash and public key encryption used in making the CA's digital signature

Certificate Signature Algorithm

14
New cards

List of certificates that have gone bad before their expiration date

Certificate Revocation List (CRL)

15
New cards

This is just a regular hash of the certificate used for identification; NOT part of the CA's digital signature

Certificate Thumbprint

16
New cards

The CA's digital signature

Certificate Signature Value

17
New cards

Any general programming interface; a provided, allowed way to programatically interact with another piece of software

API

18
New cards

Older Microsoft crypto API

CAPI

19
New cards

The new Microsoft crytpo API, uses ECC; integrates with smart cards

CNG

20
New cards

Self-signed; included by default in browsers; trusted because…trust

Root Certificate Authorities

21
New cards

Some CAs can create other CAs, etc. to verify any CA other than a root CA each CA up the path must be verified

Hierarchical Certificate Path

22
New cards

A third party such as the government holds a copy of the private key

Key Escrow

23
New cards

Explore top flashcards