Public Key Infrastructure (PKI) 1.4 Flashcards
[…] refers to the processes and procedures regarding the creation, distribution, storing, and revoking of digital certificates
Public Key Infrastructure
In […] encryption, the same key used to encrypt the data is used to decrypt it. (Shared Secret)
Does not scale well, hard to keep track of who has the key.
Symmetric Encryption
In […] encryption, two different keys are used. One for encryption, and one for decryption. Both keys are made at the same time. These keys are mathematically related and one cannot be derived from the other.
Asymmetric Encryption
In asymmetric encryption, one key is denoted as the […] key, while the other is denoted as the […] key.
Private , Public
Only one person has access to the private key while the public key can be accessed by anyone
The […] is the only key able to decrypt data encrypted by the public key.
Private key
[…] is when you have many public and private keys and you might now want to hold on and manage them yourself. This could be a 3rd party or your own organization.
Hint: KE
Key Escrow