What is the definition of Public Key Infrastructure (PKI)?
A system of policies, procedures, hardware, and software responsible for creating, distributing, managing, storing, revoking, and processing digital certificates.
What is the purpose of Public Key Infrastructure (PKI)?
To establish trust by associating a certificate to people or devices, often in conjunction with a Certificate Authority (CA).
What is a Certificate Authority (CA)?
A trusted entity that issues digital certificates and vouches for the identity of the entities to whom it issues certificates.
What is symmetric encryption?
An encryption method where the same single secret key is used for both encrypting plaintext into ciphertext and decrypting ciphertext back into plaintext.
What are two alternative terms for symmetric encryption?
What is the main scalability challenge associated with symmetric encryption?
The difficulty in securely sharing and managing the single secret key among a growing number of individuals or devices.
Why is symmetric encryption still widely used despite its scalability issues?
It is very fast and has low computational overhead compared to asymmetric encryption.
What is asymmetric encryption?
An encryption method that uses two different, mathematically related keys: a public key for encryption and a private key for decryption.
What are the roles of the public key and private key in asymmetric encryption?
In the encryption process, whose public key does Bob use to send a message to Alice?
Alice’s public key.
Whose private key is used to decrypt the message sent from Bob to Alice?
Alice’s private key.
Can a private key be derived from its corresponding public key?
No, it is impossible to derive or reverse-engineer the private key from the public key.
What is key escrow?
The practice of storing copies of cryptographic keys with a third party or within an organizational system.
Why might an organization implement key escrow?
To maintain access to encrypted data for business continuity, such as when an employee leaves or for compliance with data access requirements.
Why is it important to protect a private key with a password?
To add an additional layer of security and prevent unauthorized access to the key.
Fill in the blank: Symmetric encryption uses the same _______ for both encryption and decryption.
secret key
What is the key management challenge in organizations regarding asymmetric encryption?
Managing hundreds or thousands of public/private key pairs.
What are digital certificates?
Electronic documents used to prove the ownership of a public key.
What does the term ‘key pair’ refer to in asymmetric encryption?
The set of two mathematically related keys (public and private) generated simultaneously.
What is the ‘power and magic’ of asymmetric cryptography?
Anyone with the public key can encrypt data, but only the holder of the corresponding private key can decrypt it.
What is the scalability problem in symmetric encryption?
The complexity of distributing keys to everyone who needs to decrypt data and tracking which key belongs to whom.
What is the key generation process in asymmetric encryption?
The simultaneous creation of a public and private key pair, often involving randomization and large prime numbers.
True or False: Asymmetric encryption uses the same key for both encryption and decryption.
False