Public Key Cryptography and Digital Signatures

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Public Key Infrastructure

System ensuring secure data exchange via keys; framework for managing digital certificates and encryption.

<p>System ensuring secure data exchange via keys; framework for managing digital certificates and encryption.</p>
2
New cards

Digital Signature

Mathematical technique for authenticity and integrity; confirms authenticity of a message sender.

<p>Mathematical technique for authenticity and integrity; confirms authenticity of a message sender.</p>
3
New cards

Authentic Signature

Proof that only the signer signed the document.

<p>Proof that only the signer signed the document.</p>
4
New cards

Unalterable Signature

Document cannot be changed post-signature.

<p>Document cannot be changed post-signature.</p>
5
New cards

Not Reusable Signature

Signature cannot transfer to another document.

<p>Signature cannot transfer to another document.</p>
6
New cards

Non-repudiated Document

Signed document equates to a physical signature; Prevents denial of signing a document.

<p>Signed document equates to a physical signature; Prevents denial of signing a document.</p>
7
New cards

Code Signing

Verifying executable files with digital signatures; Process of digitally signing software to verify authenticity.

<p>Verifying executable files with digital signatures; Process of digitally signing software to verify authenticity.</p>
8
New cards

Digital Certificates

Electronic documents proving ownership of public keys.

<p>Electronic documents proving ownership of public keys.</p>
9
New cards

Digital Signature Standard (DSS)

Standards for generating and verifying digital signatures.

<p>Standards for generating and verifying digital signatures.</p>
10
New cards

Digital Signature Algorithm (DSA)

Original standard for public/private key pairs; Digital Signature Algorithm for secure digital signatures.

<p>Original standard for public/private key pairs; Digital Signature Algorithm for secure digital signatures.</p>
11
New cards

Rivest-Shamir-Adelman Algorithm (RSA)

Asymmetric algorithm for digital signatures; Rivest-Shamir-Adleman, a widely used public-key algorithm.

<p>Asymmetric algorithm for digital signatures; Rivest-Shamir-Adleman, a widely used public-key algorithm.</p>
12
New cards

Elliptic Curve Digital Signature Algorithm (ECDSA)

Efficient digital signature algorithm with small sizes; Elliptic Curve Digital Signature Algorithm for efficient signatures.

<p>Efficient digital signature algorithm with small sizes; Elliptic Curve Digital Signature Algorithm for efficient signatures.</p>
13
New cards

Integrity

Assurance that data has not been altered.

<p>Assurance that data has not been altered.</p>
14
New cards

Authenticity

Verification that data comes from a legitimate source.

<p>Verification that data comes from a legitimate source.</p>
15
New cards

Certification Path

Chain of trust from signer to trusted authority.

16
New cards

DigiCert

Trusted certificate authority for digital signatures; Commercial CA providing SSL certificates.

17
New cards

How are digital signatures created

using various mathematical techniques

18
New cards

Public Key

Key used for encrypting data in PKI; Used to verify digital signatures and encrypt messages.

19
New cards

Private Key

Key used for decrypting data in PKI.

20
New cards

Digital Certificate

Authenticates and verifies user identity in communications.

21
New cards

Hash Value

Fixed-size output from hashing a document.

22
New cards

SSL Certificate

Confirms identity of a website domain.

23
New cards

Certificate Authority (CA)

Trusted entity that issues digital certificates; Entity that issues digital certificates for identity verification.

24
New cards

Asymmetric Connection

Connection using a pair of public and private keys.

25
New cards

Credential Issuance

Process of issuing digital certificates by CAs.

26
New cards

Trusted Third Party

Entity that validates and issues digital credentials.

27
New cards

Certificate Validation

Process of confirming the authenticity of a certificate.

28
New cards

In-depth Investigation

CA's process to verify identity before issuing certificates.

29
New cards

Hash Comparison

Checks if received document hash matches decrypted signature.

30
New cards

GlobalSign

CA providing digital certificates for various needs.

31
New cards

Sectigo

CA offering SSL and other digital certificates.

32
New cards

Public Key Management

Process of exchanging and managing public keys.

33
New cards

Class 0 Certificate

Testing certificate with no identity checks performed.

34
New cards

Class 1 Certificate

Email verification for individual users.

35
New cards

Class 2 Certificate

Identity proof required for organizations.

36
New cards

Class 3 Certificate

Used for server and software signing.

37
New cards

Class 4 Certificate

For online business transactions between companies.

38
New cards

Class 5 Certificate

Used for private organizations or government security.

39
New cards

Single-root PKI Topology

Single CA issues all certificates within an organization.

40
New cards

Cross-certified CA Topology

Multiple CAs linked for broader trust relationships.

41
New cards

Hierarchical CA Topology

Structured CA system with parent-child relationships.

42
New cards

Interoperability

Ability of different PKI systems to work together.

43
New cards

Lightweight Directory Access Protocol (LDAP)

Protocol for accessing directory services over a network.

44
New cards

Self-signed Certificate

CA's public key used to verify issued certificates.

45
New cards

Certificate Enrollment Process

Process for a host system to register with PKI.

46
New cards

Certificate Revocation List (CRL)

List of certificates that have been revoked.

47
New cards

Online Certificate Status Protocol (OCSP)

Real-time protocol for checking certificate status.

48
New cards

Authentication

Process of verifying the identity of a user.

49
New cards

Certificate Exchange

Users share certificates containing their public keys.

50
New cards

SSL/TLS

Protocol for secure communication over a computer network.

51
New cards

IPsec VPNs

Secure network traffic using Internet Protocol Security.

52
New cards

HTTPS

Secure version of HTTP using SSL/TLS encryption.

53
New cards

802.1x authentication

Network access control protocol for port-based access.

54
New cards

S/MIME

Secure email protocol for encrypting and signing messages.

55
New cards

Encryption File System (EFS)

Windows feature for encrypting files on NTFS volumes.

56
New cards

Two-factor authentication

Security process requiring two forms of verification.

57
New cards

Smart cards

Physical cards used for secure authentication.

58
New cards

USB storage security

Protecting data on USB devices from unauthorized access.

59
New cards

Signature validation error

Failure to verify certificate authenticity due to issues.

60
New cards

Root certificate

Top-level certificate in a certificate authority hierarchy.

61
New cards

CRLs

Certificate Revocation Lists for invalidating certificates.

62
New cards

OCSP

Online Certificate Status Protocol for real-time certificate validation.