PKI Flashcards

(15 cards)

1
Q

Man in the Middle attacks for Public Key exchange has stemmed from the issue that the attacker can insert their own Public Key into the situation. How do we avoid this?

A

Public keys should identify people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Digital Certificate?

A

A way of binding a user/company to their public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does PKI stand for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is PKI?

A

Hardware, software, people and policies that together verify a public key with a person holding the corresponding private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 key players in PKI?

A

Certification Authorities, Registration Authorities, PKI Repositories, PKI Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Certification Authorities do?

A

Issue and revoke Public Key Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PK Certificates have signatures. What are PK Certificates signed with? Why?

A

CA Private Key. So people can check with CA public key that the private key is real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does CRL stand for?

A

Certificate Revocation Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are PKI Repositories?

A

The way of storing and managing certificates, as well as Certificate Revocation Lists (CRLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CRL?

A

List of certificates that are no longer valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do Registration Authorities do?

A

Verify certificate contents for the CA before certificates are issued

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 problems with CRLs?

A

1) Not issued frequently enough, attacker may use invalid one 2) Expensive to distribute 3) Vulnerable to DOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 steps of Certificate Issuance?

A

1) RA verifies info 2) Public-Private Key Pair generated 3) CA issues certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 steps of verifying a signature

A

1) Get certificate 2) Get CRL (Certificate Revocation List) 3) Check certificate against CRL 4) Check signature using certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 Reasons to revoke a certificate?

A

1) Private Key Compromised 2) Certificate Expired 3) Company Changes Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly