cryptology Flashcards
a _______ is electronic document used to bind a public key with an identity
digital certificate
a ______ is a hierarchy of computers that issue and manages certificates
public key infrastructure (PKI)
a _____ policy requires a administrator to manually approve or deny all request
manual
a _______ policy allows CA’s to review information within the request to determine if it is valid information
automatic
the _______ is a list of certificates revoked by the CA
certificate revocation list (CRL)
a ______ is used to checks the status of an individual digital certificate to verify if it is good or has been revoked
Online certificate status protocol (OCSP)
they are responsible for issuing tickets, holding certificate practice statements (CPS) and publishing the certificate revocation list (CRL)
subordinate CA
it is a declaration of the security that the organization is implementing for all certificates issued by the CA
certificate practice statement (CPS)
they can be used in large, enterprise environments to offload client enrollment request by handling the verification prior to certificates being issued
registration authority (RA)
a ______ issues certificates.
certificate authority (CA)
To request a certificate, a client must first
generate a public and private key pair.
a public and private key pair is generated by an application called a
cryptographic service provider (CSP)
when requesting a certificate from a CA, the client sends identifying information along with a copy of the public key this is called
certificate signing request (CSR).
the certificate revocation list (CRL) is published at the
CRL Distribution Point (CDP)
________ is the official standard of ITU Telecommunication Standardization Sector (ITU-T) that identifies the format for public key certificates and certification path validation.
X.509
______ is a user who is authorized to request certificates for other users
Enrollment agent
Users can obtain a copy of the CA’s certificate from the
Authority Information Access (AIA)
_____ is a readable message.
plain test
______ is a unreadable message to all but those for whom the message was intended.
cipher text
______ is the method of recovering original data that has been encrypted without having access to the key used in the encryption process.
cryptoanalysis
_______ is the associated items of cryptography that are used as a unit to provide a single means of encryption and decryption.
cryptosystem
_________ is the study of cryptography and cryptanalysis.
cryptology
it literally meaning “concealed writing”,
stenography
____ is the process of using an algorithm to transform data from plain text to a cipher text in order to protect the confidentiality, integrity, and sometimes the authenticity of the message.
encryption