Public Key Infrastructure Flashcards
PKI public key infrastructure
Policies, procedures, hardware, software that is responsible for creating, distributing, manage, storage, revoke processes associated with digital certificates. This is everything what you have to do with encryption in your company. Also a way to associate a certificate for people or device. This is conjunction with certificate authority and all about trust.
Symmetric encryption
There is single shared key. Encryption is with this key, and decryption is with the same key, when this is out you need new key. Also described as a secret key algorithm, where symmetric key is that one secret key (shared secret). Challenging to distribute. Is still used, is very fast often combined with asymmetric encryption.
Asymmetric encryption
Is decrypting with two different keys, which ale mathematically related. Private key - one person on one device will have access to it. Second key is public key where anyone can see this key and use this key. Someone is encrypting data using your public key, but your private key can only decrypt the data. There is no option to calculate someone’s private key when you have someone’s public key.
Key pair
This is public and private key, both are created in the same time. Process of: randomization, large prime numbers, lots of maths behind the scene.
Asymmetric encryption example
X has public an private key => Y message (plain text) and encrypted by X public key => ciphertext creation => ciphertext sent to X => X encrypts data by his private key => initial plain text visible