Advanced Cryptography

Ace your homework & exams now with Quizwiz!

Secure Shell (*SSH*)

A Unix-based command interface and protocol for securely accessing a remote computer

Certificate Repository

A centralized directory of digital certificates is called a(n) ________.

The user's identity with their public key

A digital certificate associates _________.

Extended Validation SSL Certificate

A digital certificate that turns the address bar green is a(n) ________.

Public key infrastructure (*PKI*)

A framework for all of the entries involved in digital certificates for digital certificate management

Key recovery agent (*KRA*)

A highly trusted person responsible for recovering lost or damaged digital certificates

Key escrow

A process in which keys are managed by a third party, such as a trusted *CA* called the root

Secure Socket Layer (*SSL*)

A protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data

Transport Layer Security (*TLS*)

A protocol that is an extension of SSL and guarantees privacy and data integrity between applications

Certificate Repository (*CR*)

A publicly accessible centralized directory that contains digital certificates that can be used to view the status of a digital certificate

Certificate Revocation List (*CRL*)

A repository that lists revoked digital certificates

Hypertext Transport Protocol over Secure Socket Layer (*HTTPS*)

A secure version of HTTP sent over SSL/TLS (port 443)

IP security (*IPsec*)

A set of protocols developed to support the secure exchange of packets

Registration Authority (*RA*)

A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users

M-of-N control

A technique to recover a private key by distributing parts to different individuals

Digital certificate

A technology used to associate a user's identity to a public key, in which the user's public key is "digitally signed" by a trusted third party

Third-party trust

A trust model n which two individuals trust each other because each individually trusts a third party

Hierarchical trust model

A trust model that has a single hierarchy with one master *CA*

Distributed trust model

A trust model that has multiple CAs that sign digital certificates

Bridge Trust model

A trust model with one CA that acts as a facilitator to interconnect all other CAs

Certificate Authority (*CA*)

A trusted third-party agency that is responsible for issuing the digital certificates

Direct trust

A type of trust model in which a relationship exists between two individuals because one person knows the other person

Certificate policy (*CP*)

A(n) ________ is a published set of rules that govern the operation of a PKI.

To verify the authenticity of the Registration Authorizer

Digital Certificates can be used for each of the following except _______.

is the management of digital certificates

Public key infrastructure (*PKI*) __________.

are widely accepted in the industry

Public-Key Cryptography Standards (*PKCS*) ______.

*Authorization* it includes: Creation, Suspension, Revocation, and Expiration

Which of the following is not part of the certificate life cycle?

*In hashes*, but it is stored on the user's local system, embedded in digital certificates, and in tokens

Which of the following is not where keys can be stored?

*IPsec*

Which transport encryption algorithm is integrated as part of IPv6?

Secure Shell (*SSH*) port 22

___________ is a protocol for securely accessing a remote computer.

Key escrow

____________ refers to a situation in which keys are managed by a third party, such as a trusted *CA*.

Certificate Authority

An entity that issues digital certificates is a _________.

are used in military and financial settings when it is necessary for the client to authenticate back to the server

Dual-sided digital certificates __________.

*CA expiration code* but validity period, serial number, and signature are

Each of the following is a field of an X.509 certificate except ______________.

*it is designed for use on a large scale* it assigns a signal hierarchy with one master *CA*, the master *CA* is called the root, and the root signs all digital certificate authorities with a single key

Each of the following is true regarding a hierarchical trust model except ______.

Server digital certificate

In order to ensure a secure cryptographic connection between a Web browser and a Web server, a(n) _________ would be used

Third

The _______ -party trust model supports CA

X.509

The most widely accepted format for digital certificates as defined by the International Telecommunications Union (*ITU*)

Digital certificate

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _______.

Trust model

The type of trusting relationship that can exist between individuals or entities

*HTTPS* port 443

What is the cryptographic transport protocol that is used most often to secure Web transactions?


Related study sets

Principles of Information Assurance Midterm

View Set

ACloud Guru Certified Cloud Practitioner Practice Exam

View Set

Chapter 26 Study Guide Questions

View Set