Chapter 10: Understanding Cryptography and PKI Flashcards
Certificate signing request (CSR)
Used to request a certificate
Certificate revocation list (CRL)
Revoked certificates that are cached
Subject Alternative Name (SAN)
Multiple domains with different names but owned by same organization
Online Certificate Status Protocol (OCSP)
Real-time response to validate certificates issued by a CA
Message Direct 5 (MD5)
128-bit hash
32 hexadecimal
Secure Hash Algorithms (SHA)
Verifies the integrity of files
SHA-1 - 160-bit
Hash-Based Message Authentication (HMAC)
Uses a shared secret key to add randomness to the resulted hash
Steganography
Hide data inside other data or in plain sight
Homomorphic Encryption
Allows data to remain encrypted while being processed
Lightweight Cryptography
Smaller devices such as RFID tags, sensor nodes, smart cards
Elliptic Curve Cryptography (ECC)
Graphs points on a curve to create keys
Commonly used on low-power devices