3.9 Public Key Infrastructure PKI Flashcards
Define CA (3)
- Certificate Authority
- Verifies information and signs certificates
- Provides verification and validation of certificates
Define Intermediate CA (2)
- A CA with a subset of certificates under a CA
- Limits the scope of CA compromise to only the subset of certificates it contains
Define Registration Authority (RA)
- Decides if Certificate Signature Requests CSRs should be granted after verifying and validating the requestor
Define Certificate Revocation List (CRL) (2)
- A list of certificates that have been revoked and are not valid
- Certificates may be revoked due to compromise or valid changes/updates
Define Online Certificate Status Protocol (OSCP)
Used to expedite the process of validating a certificate, instead of downloading CRL(s) which can be huge
Define Certificate Signing Request (CSR)
Final step of creating a valid certificate where the public key is sent to CA/RA to be validated or “signed”
Define Common Name (CN) relative to certificates
The fully qualified domain name(s) for which the certificate is valid
Define Subject Alternative Name (SAN)
Alternate domain names for which the certificate is valid
Define distinguished encoding rules (DER) format for certificates (2)
- Binary format, typically used with Java
- Cannot be transferred via email, unless encoded with base64 which translates it to ASCII text, for example
Define P12 certificate format (2)
- Container format capable of storing multiple certificates, useful for transferring both public and private keys
- Container access can be password protected, allowing secure transfer, especially good for private key transfer
Define PFX certificate format (2)
- Microsoft’s implementation, nearly exactly like P12
- Used to store private keys
Define PEM certificate format (2)
- Plain ASCII representation of certificate
- Not secure for transferring private keys
Define CER certificate format (2)
- Used by Windows OS to store public certificates
- Supports DER and PEM format
Define P7B certificate format (3)
- ASCII text file that can be transferred via email
- Not secure for transferring private keys
- Widely supported by multiple OS
Define aspects of online CA (2)
- Best practice is to have intermediate CA with a subset of certificates online in the organization to sign certificates
- If compromised, only the subset of certificates on it need to be re-issued