Explore tens of thousands of sets crafted by our community.
Public Key Infrastructure Terms
29
Flashcards
0/29
Online Certificate Status Protocol (OCSP)
A protocol for checking the revocation status of a digital X.509 certificate without requiring CRLs.
Certificate Revocation List (CRL)
A list of digital certificate serial numbers that have been revoked by the issuing CA before their scheduled expiration.
Asymmetric Encryption
Encryption using a pair of keys, where one key encrypts data, and the other key decrypts it.
Digital Signature
A mathematical scheme for verifying the authenticity of digital messages or documents.
Certificate Practice Statement (CPS)
A document that describes in detail how the CA uses and manages the certificates it issues.
Public Key
The key provided to everyone to encrypt messages for the key holder.
Certificate Policy (CP)
A document which states the different purposes of certificates and their approved uses within a PKI.
Key Escrow
A process by which keys are held in trust by a third party, allowing encrypted data to be accessed under predefined conditions.
Subject Alternative Name (SAN)
An extension to X.509 that allows various values to be associated with a security certificate.
Private Key
The confidential key used by the owner to decrypt messages.
Certificate Authority (CA)
An entity that issues digital certificates, affirming the identity of the certificate holder.
Registration Authority (RA)
An authority in a network that verifies user requests for a digital certificate and tells the CA to issue it.
X.509
A standard format for public key certificates, defining their structure.
Key Pair
A set of two keys used in a PKI, one public and one private, that are mathematically related.
Revocation Reason
An explanation for why a certificate is no longer valid and has been revoked.
Wildcard Certificate
A public key certificate which can be used with multiple subdomains of a domain.
Public Key Cryptography
A cryptographic system that uses a pair of keys, a public key for encrypting data and a private key for decrypting data.
Intermediate Certificate
A certificate issued by a trusted CA that can issue other certificates, creating a chain of trust.
Encryption
The process of converting information into a secure format that hides its true meaning.
Symmetric Encryption
Encryption that uses the same secret key for both encryption and decryption.
PKCS
A group of standards for public-key cryptography that includes PKCS#1, PKCS#12, etc., developed by RSA Laboratories.
Root Certificate
A self-signed certificate that identifies the Root CA.
Hash Function
A function that converts an input (or 'message') into a fixed-size string of bytes, typically for security purposes.
Chain of Trust
The series of trusted intermediaries between a root CA and the end-entity certificate.
SSL/TLS
Protocols for establishing authenticated and encrypted links between networked computers.
Digital Certificate
An electronic document used to prove the ownership of a public key.
Decryption
The process of converting encrypted information back into its original format.
Certificate Signing Request (CSR)
A message sent from an applicant to a CA, containing information required for issuing a digital certificate.
Extended Validation (EV) Certificate
A certificate where the issuing CA has verified the requesting entity's legal existence and identity to a high degree of rigor.
© Hypatia.Tech. 2024 All rights reserved.