Term
|
Definition
| encryption that uses two mathematically related keys |
|
|
Term
|
Definition
| encryption that uses a single key to encrypt and decrypt a message |
|
|
Term
|
Definition
| process of changing plaintext into ciphertext |
|
|
Term
|
Definition
| technology used to associate a users identity to a public key, in which the user's public key is digitally signed by a trusted third party |
|
|
Term
| Certificate Repository (CR) |
|
Definition
| publicly accessible centralized directory that contains digital certificates that can be used to view the status of a digital certificate |
|
|
Term
|
Definition
Receive, authenticate, and process certificate revocation requests Identify and authenticate subscribers |
|
|
Term
| Primary function of an RA |
|
Definition
| Verify identity of an individual |
|
|
Term
| Class 1: personal digital certificates |
|
Definition
Issued by an RA directly to individuals Frequently used to secure e-mail transmissions Typically only require user’s name and e-mail address to receive |
|
|
Term
| Class 2: server digital certificates |
|
Definition
Issued from a Web server to a client Ensure authenticity of the Web server Ensure authenticity of the cryptographic connection to the Web server |
|
|
Term
| Public Key Infrastructure |
|
Definition
| framework for all of the entities involved in digital certificates for digital certificate management |
|
|
Term
| Public-Key Cryptographic Standards (PKCS) |
|
Definition
Numbered set of PKI standards defined by the RSA Corporation Widely accepted in industry Based on the RSA public-key algorithm |
|
|
Term
|
Definition
Published set of rules that govern operation of a PKI Provides recommended baseline security requirements for use and operation of CA, RA, and other PKI components |
|
|
Term
| Certificate Practice Statement (CPS) |
|
Definition
| Describes in detail how the CA uses and manages certificates |
|
|
Term
|
Definition
Encrypted alternative to Telnet protocol used to access remote computers Linux/UNIX-based command interface and protocol Suite of three utilities: slogin, ssh, and scp Client and server ends of connection are authenticated using a digital certificate Passwords are encrypted Can be used as a tool for secure network backups |
|
|
Term
|
Definition
Set of protocols developed to support secure exchange of packets Operates at a low level in the OSI model |
|
|
Term
|
Definition
| Supports two encryption modes: transport and tunnel |
|
|