Public Key Infrastructure & Digital Certificates Flashcards

(13 cards)

1
Q

What is Public Key Infrastructure (PKI)?

A

Stores public keys and is trusted by all parties in a network or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does an employee use PKI to send a secure email?

A

Employee A retrieves Employee B’s public key from the PKI, encrypts the email with B’s public key, and B decrypts it using their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a public key and a private key?

A

Public Key: Shared openly.
Private Key: Kept secret, used for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the process for creating a digital signature?

A

Document content is hashed, and the hash is encrypted with the sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a recipient verify a digital signature?

A

The recipient decrypts the hash using the sender’s public key and compares it with a newly hashed document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does signing and verification refer to in digital signatures?

A

Signing = Sender’s private key
Verification = Sender’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital certificate?

A

A digital document issued by a Certificate Authority (CA) that binds a public key to an entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a business use digital certificates?

A

A business signs a certificate with its private key, and a customer verifies it using the business’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens in a combined email scenario involving encryption and digital signatures?

A

Employee A sends an encrypted and signed email to Employee B, encrypting it with B’s public key and signing it with A’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the email handling process for an encrypted and signed email?

A

Verify the digital signature and decrypt the email content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What must the receiver know before encryption?

A

The receiver must know the cryptographic algorithm and the cryptographic key.

The key + algorithm = needed to decrypt!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal when sending a secret key?

A

The goal is to send the secret key from A to B securely without coworkers seeing it.

Encrypt with B’s public key; only B’s private key can decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should a secret key be sent?

A

Use the receiver’s public key to send a secret.

Only B’s private key can decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly