PKI Cryptography Flashcards

1
Q

Framework for managing private keys and cert.’s, provides standard for key generation, authentication, distribution and storage; est. who is responsible for authenticating identity of owners of digital cert.’s, follows X.509 standard.

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

use X.509, defines procedures for distributing public keys.

*** PKCS : developed by RSA and used with PKI.

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

enables authentication of parties involved in secure transition, in public certificate is public key, private certificate is only with the owner. Having certificate with public key allows to verify the hash w/owners private key. If public key is signed with owners private key and digital certificate is appended to message then you can more assure valid message.

A

Certificate Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • certificate issuers name
  • valid from date / to date
  • owner of certificate (subject)
  • subjects public key
  • time stamp
  • certificate issuers digital signature
A

Typical Certificate Contains :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

organization for issuing, storing, revoking and distributing certificates, authenticates the certificates it issues by signing them w/their private key.

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

middleman between subscribers and CA, can distribute keys, accept registrations for CA and validate identities, RA doesn’t issue cert.’s on their own.

A

RA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alice wants to communicate with Bob, Bob registers to RA and wants cert. and private/public key pair, then request goes to CA, and then private/public keypair is sent back to Bob, cert. is stored in key store, if its a private CA its stored in the gallery (Active Directory etc), when Alice wants to communicate with Bob she reaches out to directory (key store) and says to Bob I want to communicate with you where is your cert. and public key she pulls down his cert with his public key. In his cert. is his public key, message digest encrypted with his private key, his digital cert.(digital cert.’s are signed with private keys), she can verify his cert. with her own message digest and compares both. Then using symmetric cryptography creates a session key to communicate with Bob. She encrypts message with session key, then she will encrypt that session key w/Bob’s public key, then sends it to Bob, Bob will decrypt packet with his private key, he’ll pull out session key that Alice created and decrypt message.

A

RA/CA and key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dictates circumstances in which cert. can be used, protects CA from claims of loss if cert. is misused, should identify users community, names of CA/RA, and object identifier.

A

Certificate Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

only for revoked cert.’s not expired cert.’s. Revoked due to compromise illegal activity etc, not revoked due to normal expiration.

A

CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

shouldnt be online, bring it online to do some work, but then take it back offline.

A

Root CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly