Public Key / Llave Pública

studied byStudied by 3 people
0.0(0)
get a hint
hint

Public Key –

1 / 19

20 Terms

1

Public Key –

The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data. A cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity,

New cards
2

Public Key Certificate –

A set of data that unambiguously identifies an entity, contains the entity's public key, and is digitally signed by a trusted third party (certification authority).

New cards
3

Public Key Certificate –

A set of data that uniquely identifies an entity, contains the entity’s public key, and is digitally signed by a trusted party, thereby binding the public key to the entity.

New cards
4

Public Key (Asymmetric) Cryptographic Algorithm –

A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible.

New cards
5

Public Key Cryptography –

Encryption system that uses a public-private key pair for encryption and/or digital signature.

New cards
6

Public Key Enabling (PKE) –

The incorporation of the use of certificates for security services such as authentication, confidentiality, data integrity, and non-repudiation.

New cards
7

Public Key Infrastructure (PKI) –

A set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

New cards
8

Public Seed –

A starting value for a pseudorandom number generator. The value produced by the random number generator may be made public. The public seed is often called a “salt.”

New cards
9

Public Key Infrastructure 1 –

An architecture which is used to bind public keys to entities, enable other entities to verify public key bindings, revoke such bindings, and provide other services critical to managing public keys. A Framework that is established to issue, maintain, and revoke public key certificates.

New cards
10

Public Key Infrastructure 2 –

A support service to the PIV system that provides the cryptographic keys needed to perform digital signature-based identity verification and to protect communications and storage of sensitive verification system data within identity cards and the verification system.

New cards
11

Public Key Infrastructure 3 –

The framework and services that provide for the generation, production, distribution, control, accounting, and destruction of public key certificates. Components include the personnel, policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, recover, and revoke public key certificates.

New cards
12

Secret Key 1 –

A cryptographic key that is used with a secret-key (symmetric) cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.

New cards
13

Secret Key 2 –

A cryptographic key that must be protected from unauthorized disclosure to protect data encrypted with the key. The use of the term “secret” in this context does not imply a classification level; rather, the term implies the need to protect the key from disclosure or substitution.

New cards
14

Secret Key 3 –

A cryptographic key that is uniquely associated with one or more entities. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure or substitution.

New cards
15

Secret Key 4 –

A cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public.

New cards
16

Secret Key (symmetric) Cryptographic Algorithm –

A cryptographic algorithm that uses a single secret key for both encryption and decryption. A cryptographic algorithm that uses a single key (i.e., a secret key) for both encryption and decryption.

New cards
17

Secret Seed –

A secret value used to initialize a pseudorandom number generator.

New cards
18

Secure/Multipurpose Internet Mail Extensions (S/MIME) –

A set of specifications for securing electronic mail. S/MIME is based upon the widely used MIME standard [MIME] and describes a protocol for adding cryptographic security services through MIME encapsulation of digitally signed and encrypted objects. The basic security services offered by S/MIME are authentication, non-repudiation of origin, message integrity, and message privacy. Optional security services include signed receipts, security labels, secure mailing lists, and an extended method of identifying the signer’s certificate(s).

New cards
19

Rules of Engagement (ROE) –

Detailed guidelines and constraints regarding the execution of information security testing. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.

New cards
20

Ruleset –

A table of instructions used by a controlled interface to determine what data is allowable and how the data is handled between interconnected systems. A set of directives that govern the access control functionality of a firewall. The firewall uses these directives to determine how packets should be routed between its interfaces.

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 71 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12565 people
Updated ... ago
4.7 Stars(41)

Explore top flashcards

flashcards Flashcard47 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard129 terms
studied byStudied by 39 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard73 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard85 terms
studied byStudied by 78 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard43 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard81 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)