click below
click below
Normal Size Small Size show me how
Security Chapter 6
Advanced Cryptography
| Term | Definition |
|---|---|
| bridge trust model | A trust model with one CA that acts as a facilitator to interconnect all other CAs |
| Certificate Authority (CA) | A trusted third-party agency that is responsible for issuing digital certificates |
| Certificate Repository (CR) | A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate |
| Certificate Revocation List (CRL) | A repository that lists revoked digital certificates |
| Certificate Signing Request (CSR) | A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate |
| cipher suite | A named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS |
| digital certificate | A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by a trusted third party |
| direct trust | A type of trust model in which a relationship exists between two individuals because one person knows the other person |
| distributed trust model | A trust model that has multiple CAs that sign digital certificates |
| hierarchical trust model | A trust model that has a single hierarchy with one master CA |
| Hypertext Transport Protocol Secure (HTTPS) | A secure version of HTTP sent over SSL or TLS |
| Internet Protocol Security (IPsec) | A set of protocols developed to support the secure exchange of packets between hosts or networks |
| key escrow | A process in which keys are managed by a third party, such as a trusted CA |
| key recovery agent (KRA) | A highly trusted person responsible for recovering lost or damaged digital certificates |
| Online Certificate Status Protocol (OCSP) | A protocol that performs a real-time lookup of a certificate's status |
| public key infrastructure (PKI) | A framework for managing all of the entities involved in creating storing, distributing, and revoking digital certificates |
| Registration Authority (RA) | A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users |
| Secure Shell (SSH) | A Linux/UNIX-based command interface and protocol for securely accessing a remote computer |
| Secure Sockets Layer (SSL) | A protocol originally developed by Netscape for securely transmitting data |
| session keys | Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server |
| third-party trust | A trust model in which two individuals trust each other because each individually trusts a third-party |
| Transport Layer Security (TLS) | A protocol that is more secure than SSL and guarantees privacy and data integrity between applications |
| trust model | The type of trust relationship that can exist between individuals or entities |