Public Key Infrastructure & Digital Certificates Flashcards
(13 cards)
What is Public Key Infrastructure (PKI)?
Stores public keys and is trusted by all parties in a network or organization.
How does an employee use PKI to send a secure email?
Employee A retrieves Employee B’s public key from the PKI, encrypts the email with B’s public key, and B decrypts it using their private key.
What is the difference between a public key and a private key?
Public Key: Shared openly.
Private Key: Kept secret, used for decryption.
What is the process for creating a digital signature?
Document content is hashed, and the hash is encrypted with the sender’s private key.
How does a recipient verify a digital signature?
The recipient decrypts the hash using the sender’s public key and compares it with a newly hashed document.
What does signing and verification refer to in digital signatures?
Signing = Sender’s private key
Verification = Sender’s public key
What is a digital certificate?
A digital document issued by a Certificate Authority (CA) that binds a public key to an entity.
How does a business use digital certificates?
A business signs a certificate with its private key, and a customer verifies it using the business’s public key.
What happens in a combined email scenario involving encryption and digital signatures?
Employee A sends an encrypted and signed email to Employee B, encrypting it with B’s public key and signing it with A’s private key.
What is the email handling process for an encrypted and signed email?
Verify the digital signature and decrypt the email content.
What must the receiver know before encryption?
The receiver must know the cryptographic algorithm and the cryptographic key.
The key + algorithm = needed to decrypt!
What is the goal when sending a secret key?
The goal is to send the secret key from A to B securely without coworkers seeing it.
Encrypt with B’s public key; only B’s private key can decrypt it.
How should a secret key be sent?
Use the receiver’s public key to send a secret.
Only B’s private key can decrypt it.