4a.txt

Card Set Information

Author:
CapptainClutch
ID:
92601
Filename:
4a.txt
Updated:
2011-06-30 17:35:31
Tags:
3dox2 block3 objective 4a
Folders:

Description:
3dox2 block3 objective 4a
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user CapptainClutch on FreezingBlue Flashcards. What would you like to do?


  1. a system composed of a certificate authority, certificates, software, services and other cryptographic components, for the purpose of enabling authenticity and validation of data and/or entities
    public key infrastructure (PKI)
  2. provides a means for digital certificates to identify individuals and organizations
    pki
  3. comprised of hardware, software, policies, and procedures
    pki
  4. an electronic document that associates credentials with a public key
    pki
  5. entities and or organizations that issue a request for digital certificates
    pki clients
  6. a physical or virtual object that stores authentication information
    token
  7. plastic/magnetic device that can store authentication information, such as a users private key
    smart card
  8. mathmatical summation of the data which is also called a hashcode or message digest
    hash
  9. an encrypted hash value that is appended to a message to identifu the sender and the message
    digital signatures
  10. uses a combination of a private key and a public key
    pki
  11. the reciever uses what to decrypt the digital signature
    the senders public key
  12. a protocol that combines digital certificates for authentication with rsa public key encryption
    ssl
  13. a security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a transmission control protocol/internet protocol (TCP/IP) connection
    TLS
  14. cryptographic protocols used to manage the security of message transmission on the internet
    ssl and tls
  15. ssl and tls run on which layer of the ip suite?
    application
  16. ssl/tls relies on what for their certificate services
    pki
  17. ssl and tls use strong cryptography to ensure () of numerous applications
    authentication, confidentiality, and integrity
  18. first successful algorithm to be designed for public key encryption
    rsa
  19. what is the digital signature standard
    us governments method to authenticate each party to each other via a handshake
  20. a symetric encryption algorithm that encrypts data in 64-bit blocks using a 56-bit key with 8 bits used for parity
    data encryption standard (des)

What would you like to do?

Home > Flashcards > Print Preview