Section 10: Public Key Infrastructure

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:33 PM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Users dont need to share their private keys and should share their public keys freely in

asymmetric cryptography

2
New cards

Trust Models

  • personal knowledge

  • Web of Trust (WoT): relies on indirect relationships

  • PKI

3
New cards

Web of Trust Issues

  • decentralized approach makes it difficult to manage

  • high barrier to entry

  • requires technical knowledge

4
New cards

Public Key Infrastructure (PKI)

builds upon the web of trust and depends highly upon trusted certificate authorities (CA)

5
New cards

Certificate Authority (CA)

trusted third-party organizations that verify the identity of individuals or organizations and then issue digital certificates containing both identity information and a copy of the subject’s public key.

6
New cards

Digital certificates are the identity cards of the digital world

True

7
New cards

Anyone receiving your digital certificate can verify its authenticity by

checking the digital signature of the issuing CA

8
New cards

Hash Functions

one-way functions that transform a variable length input into a unique, fixed length output

9
New cards

Hash Function Characteristics

  • one-way functions that cant be reversed

  • the output of a hash function will always be the same length regardless of the input size

  • no two inputs to a hash function should produce the same output

10
New cards

Hash Function

11
New cards

Message Digest 5 (MD5)

produces 128 bit hashes and is no longer secure

12
New cards

Message Digest is another term for hash

True

13
New cards

NIST created the Secure Hash Algorithm (SHA) family as a government standard

True

14
New cards

SHA-1

produces a 160 bit hash value; contains security flaws that make it insecure

15
New cards

SHA-2

consists a family of six hash functions; produces outputs of 224,256,384 & 512 bits; has some attacks against but still widely used

16
New cards

SHA-3

designed to replace SHA-2; uses a completely different hash generation approach than SHA-2; produces hashes of user-selected fixed length

17
New cards

RIPEMD

created as an alternative to government-sponsored hash functions; produces 128,160,256, and 320 bit hashes

18
New cards

RIPEMD contains flaws in

the 128 bit version

19
New cards

RIPEMD 160 bit

is widely used especially in bitcoin transactions

20
New cards

HMAC (Hash-based Message Authentication Code)

combines symmetric cryptography and hashing; provides authentication and integrity

21
New cards

Create and verify message authentication code by

using a secret key in conjunction with a hash function

22
New cards

Hash functions are used with asymmetric cryptography for

digital signatures and digital certificates

23
New cards

Digital signatures

use asymmetric cryptography to achieve integrity, authentication, and non repudiation

24
New cards

Signed Message Recipients Know

  • the owner of the public key is the person who signed the message (authentication)

  • the message was not altered after being signed (integrity)

  • the recipient can prove these facts to a third party (non-repudiation)

25
New cards
26
New cards
27
New cards
28
New cards
29
New cards

Explore top notes

note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)
note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)

Explore top flashcards

flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)
flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)