CP - Certificate Policy Flashcards

1
Q

What is a MOA?

A

A memorandum of agreement is used for entering in to a contractual relationship with PMAs of other PKI domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between the CP and the CPS?

A

The CP states what assurance can be placed in a Certificate issued under this policy. The Carillon Certification Practice Statements (Carillon CPSs) state how the Carillon CAs establish that assurance.

CP = What
CPS = How
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the PMA?

A

The Policy Management Authority is responsible for the f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 6 main participants in the Carillon PKI environment.

A

1) Carillon PKI authorities
- Carillon Policy Management Authority (Carillon PMA)
- Carillon PKI Operational Authority (OA)
- Carillon PKI Operational Authority Administrator
- Carillon Principal Certification Authority (PCA)
- Carillon Root CAs
- Carillon Subordinate CAs
- Certificate Status Authority (CSA)
- Time-Stamp Authority (TSA)
- Card Management System (CMS)
- Administration Workstation
2) Registration authorities
3) Subscribers
4) Relying Parties
5) Other participants
6) Applicability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 10 Carillon PKI authorities

A

Responsible for the administration and operation of the Carillon CAs.

1) Carillon Policy Maintenance Authority (PMA)
2) Carillon PKI Operational Authority (OA)
3) Carillon PKI Operational Authority Administrator
4) Carillon Principal Certification Authority (PCA)
5) Carillon Root CAs
6) Carillon Subordinate CAs
7) Certificate Status Authority (CSA)
8) Time-Stamp Authority (TSA)
9) Card Management System (CMS)
10) Administration Workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a certificate and what are the four pieces of information that it must contain?

A

A certificate is a data structure that is digitally signed by a certification authority, and contains the following

  • The identity of the certification authority issuing it
  • The identity of the certified End-Entity
  • A public key that corresponds to a Private Key under the control of the certified End-Entity
  • The operational period
  • A serial number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CertiPath?

A

Certipath is a cooperation whose purpose is to design, implement, maintain, and market a secure Public Key infrastructure communications bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Local Registration Authority (LRA)?

A

An entity that is responsible for identification and authentication of certificate subjects, but that does not sign or issue certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is UPN?

A

In the Windows operating system’s Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format. ddavies@corp.local.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is UUID?

A

A UUID (Universal Unique Identifier) is a 128-bit number used to uniquely identify some object or entity on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between the cn and the DN

A

A cn or common name represents the subscriber in a way that is understandable by humans. The DN or distinguished name will generally be the UUID, or UPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What encryption is used for public key encryption

A

3072 or 2048 bit RSA per PKCS 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is PKCS?

A

In cryptography, PKCS #1 is the first of a family of standards called Public-Key Cryptography Standards (PKCS), published by RSA Laboratories. It provides the basic definitions of and recommendations for implementing the RSA algorithm for public-key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What hashing algorithm is used?

A

SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is FIPS 186-4?

A

The Federal Information Processing Standard defines a suite of algorithms that can be used to create digital signatures established by the National Institue of Science and Technology (NIST).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Elliptical Curve Cryptography (ECC)

A

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields

17
Q

What information is required on a x509 certificate?

A

certificate (which indicates what data the certificate must include)

Serial number – the identity creating the certificate must assign it a serial number that distinguishes it from other certificates

Algorithm information – the algorithm used by the issuer to sign the certificate

Issuer distinguished name – the name of the entity
issuing the certificate (usually a certificate authority)

Validity period of the certificate – start/end date and time

Subject distinguished name – the name of the identity the certificate is issued to

Subject public key information – the public key associated with the identity

Extensions (optional)