Public Key Infrastructure Flashcards
What is the first step in getting a certificate from a Certificate Authority?
Generate a public/private key pair
What is the second step in getting a certificate from a Certificate Authority?
Generate a certificate signing request (CSR). Providing identity information is necessary.
What do Extended Validated Certificates require to be verified?
Legal and proper standings of the organisation; verify the operational existence + everything OV requires
What is the difference between EV and OV?
EV requires extensive verification, OV does not
How does a root CA become verified?
It self signs itself
How does PKI defeat MITM attack? e.g. attacker forwards the authentic certificate from example.com
Attacker does not know corresponding private key, therefore cannot know the secret
How does MITM attack public key encryption?
By providing the attackers own public key instead of the servers public key to the victim