Term
|
Definition
encryption that uses two mathematically related keys |
|
|
Term
|
Definition
encryption that uses a single key to encrypt and decrypt a message |
|
|
Term
|
Definition
process of changing plaintext into ciphertext |
|
|
Term
|
Definition
technology used to associate a users identity to a public key, in which the user's public key is digitally signed by a trusted third party |
|
|
Term
Certificate Repository (CR) |
|
Definition
publicly accessible centralized directory that contains digital certificates that can be used to view the status of a digital certificate |
|
|
Term
|
Definition
Receive, authenticate, and process certificate revocation requests Identify and authenticate subscribers |
|
|
Term
Primary function of an RA |
|
Definition
Verify identity of an individual |
|
|
Term
Class 1: personal digital certificates |
|
Definition
Issued by an RA directly to individuals Frequently used to secure e-mail transmissions Typically only require user’s name and e-mail address to receive |
|
|
Term
Class 2: server digital certificates |
|
Definition
Issued from a Web server to a client Ensure authenticity of the Web server Ensure authenticity of the cryptographic connection to the Web server |
|
|
Term
Public Key Infrastructure |
|
Definition
framework for all of the entities involved in digital certificates for digital certificate management |
|
|
Term
Public-Key Cryptographic Standards (PKCS) |
|
Definition
Numbered set of PKI standards defined by the RSA Corporation Widely accepted in industry Based on the RSA public-key algorithm |
|
|
Term
|
Definition
Published set of rules that govern operation of a PKI Provides recommended baseline security requirements for use and operation of CA, RA, and other PKI components |
|
|
Term
Certificate Practice Statement (CPS) |
|
Definition
Describes in detail how the CA uses and manages certificates |
|
|
Term
|
Definition
Encrypted alternative to Telnet protocol used to access remote computers Linux/UNIX-based command interface and protocol Suite of three utilities: slogin, ssh, and scp Client and server ends of connection are authenticated using a digital certificate Passwords are encrypted Can be used as a tool for secure network backups |
|
|
Term
|
Definition
Set of protocols developed to support secure exchange of packets Operates at a low level in the OSI model |
|
|
Term
|
Definition
Supports two encryption modes: transport and tunnel |
|
|