Public Key / Llave Pública

0.0(0)
Studied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

Last updated 8:19 PM on 11/12/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards
Public Key –
The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data. A cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity,
2
New cards
Public Key Certificate –
A set of data that unambiguously identifies an entity, contains the entity's public key, and is digitally signed by a trusted third party (certification authority).
3
New cards
Public Key Certificate –
A set of data that uniquely identifies an entity, contains the entity’s public key, and is digitally signed by a trusted party, thereby binding the public key to the entity.
4
New cards
Public Key (Asymmetric) Cryptographic Algorithm –
A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible.
5
New cards
Public Key Cryptography –
Encryption system that uses a public-private key pair for encryption and/or digital signature.
6
New cards
Public Key Enabling (PKE) –
The incorporation of the use of certificates for security services such as authentication, confidentiality, data integrity, and non-repudiation.
7
New cards
Public Key Infrastructure (PKI) –
A set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
8
New cards
Public Seed –
A starting value for a pseudorandom number generator. The value produced by the random number generator may be made public. The public seed is often called a “salt.”
9
New cards
Public Key Infrastructure 1 –
An architecture which is used to bind public keys to entities, enable other entities to verify public key bindings, revoke such bindings, and provide other services critical to managing public keys. A Framework that is established to issue, maintain, and revoke public key certificates.
10
New cards
Public Key Infrastructure 2 –
A support service to the PIV system that provides the cryptographic keys needed to perform digital signature-based identity verification and to protect communications and storage of sensitive verification system data within identity cards and the verification system.
11
New cards
Public Key Infrastructure 3 –
The framework and services that provide for the generation, production, distribution, control, accounting, and destruction of public key certificates. Components include the personnel, policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, recover, and revoke public key certificates.
12
New cards
Secret Key 1 –
A cryptographic key that is used with a secret-key (symmetric) cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
13
New cards
Secret Key 2 –
A cryptographic key that must be protected from unauthorized disclosure to protect data encrypted with the key. The use of the term “secret” in this context does not imply a classification level; rather, the term implies the need to protect the key from disclosure or substitution.
14
New cards
Secret Key 3 –
A cryptographic key that is uniquely associated with one or more entities. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure or substitution.
15
New cards
Secret Key 4 –
A cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public.
16
New cards
Secret Key (symmetric) Cryptographic Algorithm –
A cryptographic algorithm that uses a single secret key for both encryption and decryption. A cryptographic algorithm that uses a single key (i.e., a secret key) for both encryption and decryption.
17
New cards
Secret Seed –
A secret value used to initialize a pseudorandom number generator.
18
New cards
Secure/Multipurpose Internet Mail Extensions (S/MIME) –
A set of specifications for securing electronic mail. S/MIME is based upon the widely used MIME standard [MIME] and describes a protocol for adding cryptographic security services through MIME encapsulation of digitally signed and encrypted objects. The basic security services offered by S/MIME are authentication, non-repudiation of origin, message integrity, and message privacy. Optional security services include signed receipts, security labels, secure mailing lists, and an extended method of identifying the signer’s certificate(s).
19
New cards
Rules of Engagement (ROE) –
Detailed guidelines and constraints regarding the execution of information security testing. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.
20
New cards
Ruleset –
A table of instructions used by a controlled interface to determine what data is allowable and how the data is handled between interconnected systems. A set of directives that govern the access control functionality of a firewall. The firewall uses these directives to determine how packets should be routed between its interfaces.

Explore top notes

note
Unit 5: Period 5: 1844-1877
Updated 1038d ago
0.0(0)
note
Module 3 Summary
Updated 318d ago
0.0(0)
note
Unit 4: Magnetic Fields
Updated 1071d ago
0.0(0)
note
Untitled
Updated 1112d ago
0.0(0)
note
Cold War
Updated 1261d ago
0.0(0)
note
Chapter 12- The Cell Cycle
Updated 1171d ago
0.0(0)
note
AP Precalculus Ultimate Guide
Updated 102d ago
0.0(0)
note
Unit 5: Period 5: 1844-1877
Updated 1038d ago
0.0(0)
note
Module 3 Summary
Updated 318d ago
0.0(0)
note
Unit 4: Magnetic Fields
Updated 1071d ago
0.0(0)
note
Untitled
Updated 1112d ago
0.0(0)
note
Cold War
Updated 1261d ago
0.0(0)
note
Chapter 12- The Cell Cycle
Updated 1171d ago
0.0(0)
note
AP Precalculus Ultimate Guide
Updated 102d ago
0.0(0)

Explore top flashcards

flashcards
The Great War Study Guide
48
Updated 1079d ago
0.0(0)
flashcards
Unit 2 Study Guide
31
Updated 485d ago
0.0(0)
flashcards
MMW 11: Chang midterm
143
Updated 492d ago
0.0(0)
flashcards
Los deportes
22
Updated 356d ago
0.0(0)
flashcards
ch 13 woobie
25
Updated 1088d ago
0.0(0)
flashcards
Spanish 2: La Salud
49
Updated 836d ago
0.0(0)
flashcards
Mechanics of Breathing
30
Updated 1197d ago
0.0(0)
flashcards
The Great War Study Guide
48
Updated 1079d ago
0.0(0)
flashcards
Unit 2 Study Guide
31
Updated 485d ago
0.0(0)
flashcards
MMW 11: Chang midterm
143
Updated 492d ago
0.0(0)
flashcards
Los deportes
22
Updated 356d ago
0.0(0)
flashcards
ch 13 woobie
25
Updated 1088d ago
0.0(0)
flashcards
Spanish 2: La Salud
49
Updated 836d ago
0.0(0)
flashcards
Mechanics of Breathing
30
Updated 1197d ago
0.0(0)