Advanced Cryptography

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Secure Shell (*SSH*)

A Unix-based command interface and protocol for securely accessing a remote computer

Certificate Repository

A centralized directory of digital certificates is called a(n) ________.

The user's identity with their public key

A digital certificate associates _________.

Extended Validation SSL Certificate

A digital certificate that turns the address bar green is a(n) ________.

Public key infrastructure (*PKI*)

A framework for all of the entries involved in digital certificates for digital certificate management

Key recovery agent (*KRA*)

A highly trusted person responsible for recovering lost or damaged digital certificates

Key escrow

A process in which keys are managed by a third party, such as a trusted *CA* called the root

Secure Socket Layer (*SSL*)

A protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data

Transport Layer Security (*TLS*)

A protocol that is an extension of SSL and guarantees privacy and data integrity between applications

Certificate Repository (*CR*)

A publicly accessible centralized directory that contains digital certificates that can be used to view the status of a digital certificate

Certificate Revocation List (*CRL*)

A repository that lists revoked digital certificates

Hypertext Transport Protocol over Secure Socket Layer (*HTTPS*)

A secure version of HTTP sent over SSL/TLS (port 443)

IP security (*IPsec*)

A set of protocols developed to support the secure exchange of packets

Registration Authority (*RA*)

A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users

M-of-N control

A technique to recover a private key by distributing parts to different individuals

Digital certificate

A technology used to associate a user's identity to a public key, in which the user's public key is "digitally signed" by a trusted third party

Third-party trust

A trust model n which two individuals trust each other because each individually trusts a third party

Hierarchical trust model

A trust model that has a single hierarchy with one master *CA*

Distributed trust model

A trust model that has multiple CAs that sign digital certificates

Bridge Trust model

A trust model with one CA that acts as a facilitator to interconnect all other CAs

Certificate Authority (*CA*)

A trusted third-party agency that is responsible for issuing the digital certificates

Direct trust

A type of trust model in which a relationship exists between two individuals because one person knows the other person

Certificate policy (*CP*)

A(n) ________ is a published set of rules that govern the operation of a PKI.

To verify the authenticity of the Registration Authorizer

Digital Certificates can be used for each of the following except _______.

is the management of digital certificates

Public key infrastructure (*PKI*) __________.

are widely accepted in the industry

Public-Key Cryptography Standards (*PKCS*) ______.

*Authorization* it includes: Creation, Suspension, Revocation, and Expiration

Which of the following is not part of the certificate life cycle?

*In hashes*, but it is stored on the user's local system, embedded in digital certificates, and in tokens

Which of the following is not where keys can be stored?

*IPsec*

Which transport encryption algorithm is integrated as part of IPv6?

Secure Shell (*SSH*) port 22

___________ is a protocol for securely accessing a remote computer.

Key escrow

____________ refers to a situation in which keys are managed by a third party, such as a trusted *CA*.

Certificate Authority

An entity that issues digital certificates is a _________.

are used in military and financial settings when it is necessary for the client to authenticate back to the server

Dual-sided digital certificates __________.

*CA expiration code* but validity period, serial number, and signature are

Each of the following is a field of an X.509 certificate except ______________.

*it is designed for use on a large scale* it assigns a signal hierarchy with one master *CA*, the master *CA* is called the root, and the root signs all digital certificate authorities with a single key

Each of the following is true regarding a hierarchical trust model except ______.

Server digital certificate

In order to ensure a secure cryptographic connection between a Web browser and a Web server, a(n) _________ would be used

Third

The _______ -party trust model supports CA

X.509

The most widely accepted format for digital certificates as defined by the International Telecommunications Union (*ITU*)

Digital certificate

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _______.

Trust model

The type of trusting relationship that can exist between individuals or entities

*HTTPS* port 443

What is the cryptographic transport protocol that is used most often to secure Web transactions?


Kaugnay na mga set ng pag-aaral

Principles of Information Assurance Midterm

View Set

ACloud Guru Certified Cloud Practitioner Practice Exam

View Set

Chapter 26 Study Guide Questions

View Set