Section 23: Public Key Infrastructure Flashcards

1
Q

Public Key Infrastructure (PKI)

A

Public Key Infrastructure (PKI)
o Software, services, and hardware that support the generation of digital certificates and capabilities of public-key encryption

When you go to www.website.com, your web browser is going to reach out to the Certificate Authority and ask for a copy of that sites public key. It is then going to send a random number(key), encrypted with the Public Key. Once both parties have the same secret key, they can begin using that to send data back and forth.

If all this happens successfully, you will see the padlock in your browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certificate Authority (CA)

A

o Issues and guarantees signed digital certificates
o A CA can be either private or public
▪ Provide certificate services to users
▪ Ensure validity of certificates and the identities of those applying for a certificate
▪ Establish trust in the CA from users, government, regulatory authorities, and enterprises
▪ Manage servers and repositories that store and administer the
certificates
▪ Perform key and certificate lifecycle management, from generation to revocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certificate Chaining (Chain of Trust)

A

Validates a certificate by tracing each CA that signs the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Registration Authority (RA)

A

o Accepts requests for digital certificates and performs additional steps to validate an authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Certificate

A

o A digitally signed electronic document that bind a public key with a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wildcard certificates

A

Wildcard certificates
● Allow all of the subdomains to use the same public key certificate
and have it displayed as valid

*.website.com = mail.website.com….support.website.com….uk.website.com…etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Single Sided vs Double Sided Certificate

A

▪ Single-sided Certificate
● Does not require to have your own digital certificate

▪ Dual-sided Certificate
● Requires the user to also authenticate themselves to the server with their own certificate. Better for security, but is more intensive and slower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital Signature

A

Created by hashing the file then taking the resulting hash digest and
encrypting it with a user’s private key from their digital certificate. This is used in code signing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Online Certificate Status Protocol (OCSP)

A

▪ A protocol that allows us to determine the revocation status of a digital certificate using its serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certificate pinning

A

Instead of relying solely on the traditional CA-based verification, certificate pinning involves associating a specific cryptographic identity with the server and enforcing that identity during subsequent connections.
In certificate pinning, the client is configured to trust a specific public key or certificate provided by the server rather than trusting any CA-signed certificate. This can be achieved by hardcoding the public key or certificate information within the client application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificate Stapling

A

▪ Allows a webserver to perform certificate status checking instead of the browser
▪ This method resolves the issues of certificate pinning by having the
webserver obtain a time-stamped OCSP response from the certificate
authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTP Strict Transport Security (HSTS)

A

▪ The webserver is configured to notify web browsers that are connecting to it that they should only request the website using HTTPS and not HTTP
▪ Prevents on-path or man-in-the-middle attacks by exploiting the HTTP website connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly