3 - 5: Public Key Infrastructure Flashcards

1
Q

Web of Trust

A

Based on not knowing everyone you might exchange keys with; participants sign for the people they trust forming indirect trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Problems with Web of Trust

A

Decentralized; high barrier of entry for new users; somewhat technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public Key Infrastructure

A

Introduces certificate authorities to build on trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificate Authorities

A

Third-party authorities who verify the identity of individuals or organizations and issue certs with both identity information and a copy of their public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital certificates

A

The certificate itself does not contain sensitive data, just a public key that can be checked against the CA itself. Only you have the private key to decrypt public-key encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash Function

A

A one-way function that transforms a variable length input into a unique, fixed-length output; cannot be reversed; outputs are always the same length; no two inputs should produce the same output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hash Function fails

A

If: they are not reversible, not collision resistant (unique output)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Message Digest 5

A

Created in 1991, produces a 128-bit hash, considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Hash Algorithm - 1

A

Produces a 160-bit hash value, considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secure Hash Algorithm - 2

A

A family of six hash functions, outputs of 224, 256, 384, 512 bits; mathematically similar to SHA-1 and MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure Hash Algorithm - 3

A

Anticipating risks to SHA-2, NIST adopted SHA-3 using the Keccak algorithm to produce hashes of any length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RIPEMD

A

Created as an alternative to government hash functions, available as 128, 160, 256, and 320-bit hashes. The 128 bit is considered insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hash-based Message Authentication Code

A

Combines symmetric cryptography and hashing to provide authentication and integrity for messages. A message sender provides a secret key used with the hash function to create a message authentication code. The recipient uses that key to verify the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital signatures

A

Use asymmetric cryptography to verify a message: 1) owner of public key is the one who signed it; 2) the message was not altered after it was signed; 3) recipient can prove this to a third party. Use depends on collision-resistant has functions and asymmetric cryptography (1 to 1 public/private key pair). Encrypted by a private key to indicate a specific person created the message, unlike regular asymmetric crypto. Digital signing does not provide confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signature Standard

A

Supports 3 DS algorithms: 1) DSA, 2) RSA, 3) Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Older way of revoking certificate

A

The CA maintains a list with serial numbers of certificates it has revoked, and requires users to download the list

17
Q

Online certificate status protocol

A

Users send a request to the CA to verify the certificate is still active, CA checks the serial number, then sends back a yes or no

18
Q

Certificate stapling

A

Typically, OCSP consists of web browser submits an OCSP request, then sends results to the certificate authority. Certificate Stapling cuts a step out and requests a cert from the CA itself, who provides a timestamped and signed status to the OCSP, then returning it to the browser

19
Q

Certificate Authorities

A

Trusted organizations who issue digital certificates

20
Q

Self-signed certificates

A

An organization sets up its own certificate authority for internal use only

21
Q

Certificate chaining

A

Having a self-signed certificate authority be trusted by an outside/commercial CA, making it an intermediary CA. Chaining also allows for offline certificate use as the private key is kept in an unconnected network

22
Q

Certificate subject

A

Owner of the certificate’s public key

23
Q

Object Identifier (OID)

A

A unique number sequence to identify elements in a digital certificate

24
Q

Certificate Pinning

A

Tells certificate users to not expect a certificate to change, and that they should remember it for a long period of time. An unexpected certificate change may be an attack attempt

25
Q

Root certificate

A

The core certificate at the foundation of a chain

26
Q

Wildcard certificates

A

Able to match different subjects associated with a domain. Wildcards only replace a single name feature. Commonly used for load balancers.

27
Q

Domain validation

A

Verifies domain ownership and communicates with the registered owner (lowest level)

28
Q

Organizational validation

A

Verifies domain as well as the name of the organization purchasing the certificate matches additional records.

29
Q

Extended validation

A

With certificate subject information, the CA will investigate the physical existence and legitimacy

30
Q

Distinguished Encoding Rules

A

A binary certificate format with .DER, .CRT, and .CER file extensions

31
Q

Privacy Enhanced Mail

A

An ASCII certificate equivalent of DER based on the outdated Privacy Enhanced Mail standard. Easily convert between binary and ASCII with Open SSL. Also uses .CER file extensions

32
Q

Personal Information Exchange (PFX)

A

A binary certificate format common in Windows systems with .PFX and .P12 file extensions

33
Q

P7B

A

ASCII equivalent for PFX, commonly used in Windows

34
Q

X.509

A

Government standard for structure and content of digital certificates