Public Key Infrastructure (PKI) 1.4 Flashcards

1
Q

[…] refers to the processes and procedures regarding the creation, distribution, storing, and revoking of digital certificates

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In […] encryption, the same key used to encrypt the data is used to decrypt it. (Shared Secret)

Does not scale well, hard to keep track of who has the key.

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In […] encryption, two different keys are used. One for encryption, and one for decryption. Both keys are made at the same time. These keys are mathematically related and one cannot be derived from the other.

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In asymmetric encryption, one key is denoted as the […] key, while the other is denoted as the […] key.

A

Private , Public

Only one person has access to the private key while the public key can be accessed by anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The […] is the only key able to decrypt data encrypted by the public key.

A

Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

[…] is when you have many public and private keys and you might now want to hold on and manage them yourself. This could be a 3rd party or your own organization.

Hint: KE

A

Key Escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly