Lesson 6 - Implementing Public Key Infrastructure Flashcards

1
Q

Framework of certificate authorities, digial certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

A

Public key infrastructure (PKI).
Public key cryptography solves the problem of distributing encryption keys when you want to communicate securely with others or authenticate a message that you send to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A server that guarantees subject identities by issuing signed digital certifcate wrappers for their public keys.

A

certificate authority (CA).
The entity responsible for issuing and guaranteeing certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Critical PKI concept, and shows how users and different CAs are able to trust one another.

A

The trust model i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method of validating a certificate by tracing each CA that signs the certificate, up through the hierarchy to the root CA. Also referred to as chain of trust.

A

certificate chaining, or a chain of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In PKI, a CA that is available to accept and process certificate signing requests, publish certificate revocation lists, and perform other certificate management tasks.

A

online CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In PKI, a CA (typically the root CA) that has been disconnected from the network to protect it from compromise.

A

offline CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Base64 ASCII file that a subject sends to a CA to get a certificate.

A

certificate signing request (CSR).
The CSR is a Base64 ASCII file containing the information that the subject wants to use in the certificate, including its public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In PKI, an authority that accepts requests for digital certificates and authenticates the entities making those requests.

A

registration authorities (RAs).
These entities complete identity checking and submit CSRs on behalf of end users, but they do not actually sign or issue certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An X.509 digital certificate is issued by a Certificate Authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization.

A

digital certificate.
Attributes:
Serial number - A number uniquely identifying the certificate within the domain of its CA.
Signature algorithm - The algorithm used by the CA to sign the certificate.
Issuer - The name of the CA.
Valid from/to - Date and time during which the certificate is valid.
Subject - The name of the certificate holder, expressed as a distinguished name (DN).Within this, the common name (CN) part should usually match either the fully qualified domain name (FQDN) of the server or a user email address.
Public key - Public key and algorithm used by the certificate holder.
Extensions - V3 certificates can be defined with extended attributes, such as friendly subject or issuer names, contact email addresses, and intended key usage.
Subject alternative name (SAN) - This extension field is the preferred mechanism to identify the DNS name or names by which a host is identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Series of standards defining the use of certificate authorities and digital certificates.

A

Public Key Cryptography Standards (PKCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.

A

common name (CN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Field in a digital certificate allowing a host to be identified by multiple host names/subdomains.

A

subject alternative name (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A document that defines the different types of certificates issued by a CA.

A

Certificate policies.
A certificate type is set by configuring the the Key Usage attribute. The Extended Key Usage (EKU) field—referred to by Microsoft as Enhanced Key Usage—is a complementary means of defining usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A digital certificate that guarantees the identity of e-commerce sites and other websites that gather and store confidential information.

A

server certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Proving the ownership of a particular domain.

A

Domain Validation (DV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Subjecting to a process that requires more rigorous checks on the subject’s legal identity and control over the domain or software being signed.

A

Extended Validation (EV).
An EV certificate cannot be issued for a wildcard domain.

17
Q

The method of using a digital signature to ensure the source and integrity of programming code.

A

code signing certificate.
Issued to a software publisher, following some sort of identity check and validation process by the CA.

18
Q

In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.

A

root certificate.
The root certificate is self-signed.
A root certificate would normally use a key size of at least 2048 bits.
Many providers are switching to 4096 bits.
The CN for a root certificate is set to the organization/CA name, such as “CompTIA Root CA,” rather than an FQDN.

19
Q

A digital certificate that has been signed by the entity that issued it, rather than by a CA.

A

self-signed certificate

20
Q

A means of limiting access to critical encryption keys such as the private key of a root CA. At least M of the total number (N) of authorized individuals must be present to access the key.

A

M-of-N control.
Another way to use M-of-N control is to split a key between several storage devices (such as three USB sticks, any two of which could be used to recreate the full key).

21
Q

In key management, the storage of a backup key with a third party.

A

Escrow

22
Q

A list of certificates that were revoked before their expiration date.

A

certificate revocation list (CRL).
A revoked certificate is no longer valid and cannot be “un-revoked” or reinstated.
A suspended certificate can be re-enabled.

23
Q

Allows clients to request the status of a digital certificate, to check whether it is revoked.

A

Online Certificate Status Protocol (OCSP)

24
Q

Mechanism used to mitigate performance and privacy issues when requesting certificate status from an OCSP responder.

A

OCSP stapling

25
Q

A deprecated method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize man-in-the-middle attacks.

A

Pinning

26
Q

Embedding the certificate data in the application code, or by submitting one or more public keys to an HTTP browser via an HTTP header.

A

HTTP Public Key Pinning (HPKP).
HPKP has serious vulnerabilities and has been deprecated.
Replaced with Certificate Transparency Framework.

27
Q

The binary format used to structure the information in a digital certificate.

A

Distinguished Encoding Rules (DER)

28
Q

7-bit code page mapping binary values to character glyphs.

A

ASCII.
Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.

29
Q

Base64 encoding scheme used to store certificate and key data as ASCII text.

A

Privacy-enhanced Electronic Mail (PEM)

30
Q

Three character file extension

A

a convention.
not a standard.
do not always map cleanly to the type of encoding used within a certificate file, or even to the contents of a certificate file.
Both .DER and .PEM can be used as file extensions, although the latter is not recognized by Windows. .PEM is the the most widely used extension for ASCII format files in Linux.
The .CRT and .CER extensions can also be used, but they they are not well-standardized. Most of the confusion arises from the way Windows handles certificates. In Linux, .CRT is most likely to represent an ASCII certificate. In Windows, the most common extension is .CER, but this does not tell you whether the file format is binary or ASCII.

31
Q

Format that allows a private key to be exported along with its digital certificate.

A

PKCS #12 format.
This would be used either to transfer a private key to a host that could not generate its own keys, or to back up/archive a private key.
Usually password-protected and always binary.

32
Q

Windows file format for storing a private key and certificate data.

A

.PFX extension.
The file can be password-protected.
MacOS and iOS use .P12.
In Linux, the certificate and key are usually stored in separate files.

33
Q

The stages in a key’s life cycle

A

Generation
Certificate generation
Storage
Revocation
Expiration and renewal

34
Q

Signing and encrypting email messages is done with an email certificate, typically using

A

Secure/Multipurpose Internet Mail Extensions (SMIME) or Pretty Good Privacy (PGP)