3 - 5: Public Key Infrastructure Flashcards

1
Q

Web of Trust

A

Based on not knowing everyone you might exchange keys with; participants sign for the people they trust forming indirect trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Problems with Web of Trust

A

Decentralized; high barrier of entry for new users; somewhat technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public Key Infrastructure

A

Introduces certificate authorities to build on trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificate Authorities

A

Third-party authorities who verify the identity of individuals or organizations and issue certs with both identity information and a copy of their public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital certificates

A

The certificate itself does not contain sensitive data, just a public key that can be checked against the CA itself. Only you have the private key to decrypt public-key encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash Function

A

A one-way function that transforms a variable length input into a unique, fixed-length output; cannot be reversed; outputs are always the same length; no two inputs should produce the same output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hash Function fails

A

If: they are not reversible, not collision resistant (unique output)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Message Digest 5

A

Created in 1991, produces a 128-bit hash, considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Hash Algorithm - 1

A

Produces a 160-bit hash value, considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secure Hash Algorithm - 2

A

A family of six hash functions, outputs of 224, 256, 384, 512 bits; mathematically similar to SHA-1 and MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure Hash Algorithm - 3

A

Anticipating risks to SHA-2, NIST adopted SHA-3 using the Keccak algorithm to produce hashes of any length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RIPEMD

A

Created as an alternative to government hash functions, available as 128, 160, 256, and 320-bit hashes. The 128 bit is considered insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hash-based Message Authentication Code

A

Combines symmetric cryptography and hashing to provide authentication and integrity for messages. A message sender provides a secret key used with the hash function to create a message authentication code. The recipient uses that key to verify the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital signatures

A

Use asymmetric cryptography to verify a message: 1) owner of public key is the one who signed it; 2) the message was not altered after it was signed; 3) recipient can prove this to a third party. Use depends on collision-resistant has functions and asymmetric cryptography (1 to 1 public/private key pair). Encrypted by a private key to indicate a specific person created the message, unlike regular asymmetric crypto. Digital signing does not provide confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signature Standard

A

Supports 3 DS algorithms: 1) DSA, 2) RSA, 3) Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Older way of revoking certificate

A

The CA maintains a list with serial numbers of certificates it has revoked, and requires users to download the list

17
Q

Online certificate status protocol

A

Users send a request to the CA to verify the certificate is still active, CA checks the serial number, then sends back a yes or no

18
Q

Certificate stapling

A

Typically, OCSP consists of web browser submits an OCSP request, then sends results to the certificate authority. Certificate Stapling cuts a step out and requests a cert from the CA itself, who provides a timestamped and signed status to the OCSP, then returning it to the browser

19
Q

Certificate Authorities

A

Trusted organizations who issue digital certificates

20
Q

Self-signed certificates

A

An organization sets up its own certificate authority for internal use only

21
Q

Certificate chaining

A

Having a self-signed certificate authority be trusted by an outside/commercial CA, making it an intermediary CA. Chaining also allows for offline certificate use as the private key is kept in an unconnected network

22
Q

Certificate subject

A

Owner of the certificate’s public key

23
Q

Object Identifier (OID)

A

A unique number sequence to identify elements in a digital certificate

24
Q

Certificate Pinning

A

Tells certificate users to not expect a certificate to change, and that they should remember it for a long period of time. An unexpected certificate change may be an attack attempt

25
Root certificate
The core certificate at the foundation of a chain
26
Wildcard certificates
Able to match different subjects associated with a domain. Wildcards only replace a single name feature. Commonly used for load balancers.
27
Domain validation
Verifies domain ownership and communicates with the registered owner (lowest level)
28
Organizational validation
Verifies domain as well as the name of the organization purchasing the certificate matches additional records.
29
Extended validation
With certificate subject information, the CA will investigate the physical existence and legitimacy
30
Distinguished Encoding Rules
A binary certificate format with .DER, .CRT, and .CER file extensions
31
Privacy Enhanced Mail
An ASCII certificate equivalent of DER based on the outdated Privacy Enhanced Mail standard. Easily convert between binary and ASCII with Open SSL. Also uses .CER file extensions
32
Personal Information Exchange (PFX)
A binary certificate format common in Windows systems with .PFX and .P12 file extensions
33
P7B
ASCII equivalent for PFX, commonly used in Windows
34
X.509
Government standard for structure and content of digital certificates