cryptology Flashcards
a _______ is electronic document used to bind a public key with an identity
digital certificate
a ______ is a hierarchy of computers that issue and manages certificates
public key infrastructure (PKI)
a _____ policy requires a administrator to manually approve or deny all request
manual
a _______ policy allows CA’s to review information within the request to determine if it is valid information
automatic
the _______ is a list of certificates revoked by the CA
certificate revocation list (CRL)
a ______ is used to checks the status of an individual digital certificate to verify if it is good or has been revoked
Online certificate status protocol (OCSP)
they are responsible for issuing tickets, holding certificate practice statements (CPS) and publishing the certificate revocation list (CRL)
subordinate CA
it is a declaration of the security that the organization is implementing for all certificates issued by the CA
certificate practice statement (CPS)
they can be used in large, enterprise environments to offload client enrollment request by handling the verification prior to certificates being issued
registration authority (RA)
a ______ issues certificates.
certificate authority (CA)
To request a certificate, a client must first
generate a public and private key pair.
a public and private key pair is generated by an application called a
cryptographic service provider (CSP)
when requesting a certificate from a CA, the client sends identifying information along with a copy of the public key this is called
certificate signing request (CSR).
the certificate revocation list (CRL) is published at the
CRL Distribution Point (CDP)
________ is the official standard of ITU Telecommunication Standardization Sector (ITU-T) that identifies the format for public key certificates and certification path validation.
X.509
______ is a user who is authorized to request certificates for other users
Enrollment agent
Users can obtain a copy of the CA’s certificate from the
Authority Information Access (AIA)
_____ is a readable message.
plain test
______ is a unreadable message to all but those for whom the message was intended.
cipher text
______ is the method of recovering original data that has been encrypted without having access to the key used in the encryption process.
cryptoanalysis
_______ is the associated items of cryptography that are used as a unit to provide a single means of encryption and decryption.
cryptosystem
_________ is the study of cryptography and cryptanalysis.
cryptology
it literally meaning “concealed writing”,
stenography
____ is the process of using an algorithm to transform data from plain text to a cipher text in order to protect the confidentiality, integrity, and sometimes the authenticity of the message.
encryption
______ is the procedure used to convert data from cipher text into plain text.
decryption
________ cryptography uses a series of photons to encrypt and send messages
quantum
_______ is a seed value used in encryption.
initialization vector (IV)
a ______ cipher changes the position of characters in the plain text message.
transposition also called
anagram
a _______ cipher replaces one set of characters with symbols or another character set.
substitution
a ______ is a function that takes a variable-length string (message) and compresses and transforms it into a fixed-length value
hash
• The hash value (output) is also referred to as a
message digest or digital fingerprint.
_____ is the process of ensuring the security and availability of digital certificates.
Certificate management
_________ model is used when one organization with a CA structure needs to trust certificates from another organization that has its own CA structure
a cross-certification or bridge
a _______ configuration allows clients in one organization to trust any certificate issued by the other organization’s CAs and vice versa.
root-to-root
a _____ configuration provides trust paths that can be configured for more restrictive certificate validation.
mesh