ch 14 PKI and Encryption Protocols Flashcards
Internet Protocol Security (IPsec)
ex Security association Authentication header (AH): Encapsulating Security Payload (ESP):
SA
his is the establishment of secure connections
and shared security information, using either certificates or cryptographic
keys.
AH
This offers integrity and authentication
ESP
This provides integrity, confidentiality,
and authenticity of packets.
Certificates
are digitally signed electronic documents that bind a public key with a
user identity.
X.509 standard,
ca issues certificates
In a PKI system that uses a CA, the CA is known as a trusted third party.
Most PKI systems use a CA. The CA
a registration authority (RA)
is used to verify requests for certificates.
If the request is deemed valid, the RA informs the CA to issue the certificate
certificate revocation list (CRL)
list of certificates that are no longer valid
or that have been revoked by the issuer.
carry digital signatures to prevent DoS and
spoofing attacks; the CRL is digitally signed by the CA.
web of trust
public authentication of public keys common to CA-based PKIs.