CompTIA Security+ (SY0-601): Public Key Infrastructure
This section covers the foundational components of PKI, which is the framework that uses public key cryptography to manage digital certificates, secure communication, and authenticate identities. It explains certificates, X.509 standards, wildcard and SAN certificates, and the differences between single-sided and dual-sided validation.
PKI
Public Key Infrastructure:
An entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption
PKI and public key encryption are related but they are not the same thing
PKI is the entire system and just uses public key cryptography to function
Key Terms
PKI
Public Key Infrastructure:
An entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption
Certificates
Digitally-signed electronic documents that bind a public key with a user’s identity
X.509
Standard used PKI for digital certificates and contains the owner/user’s information and the certificate authority’s information
Wildcard Certificates
Allow all of the subdomains to use the same public key certificate and have it displayed as valid
Wildcard certifica...
Subject Alternative Name (SAN)
Subject Alternative Name:
Allows a certificate owner to specify additional domains and IP a...
Single vs. Dual-sided Certificates
Single-sided certificates only require the server to be validated
Dual-sided certificates require both the server an...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
PKI | Public Key Infrastructure: PKI and public key encryption are related but they are not the same thing PKI is the entire system and just uses public key cryptography to function |
Certificates | Digitally-signed electronic documents that bind a public key with a user’s identity |
X.509 | Standard used PKI for digital certificates and contains the owner/user’s information and the certificate authority’s information |
Wildcard Certificates | Allow all of the subdomains to use the same public key certificate and have it displayed as valid Wildcard certificates are easier to manage |
Subject Alternative Name (SAN) | Subject Alternative Name: Allows a certificate owner to specify additional domains and IP addresses to be supported |
Single vs. Dual-sided Certificates | Single-sided certificates only require the server to be validated Dual-sided certificates require both the server and the user to be validated |
X.690 | Uses BER, CER, & DER for encoding |
Basic Encoding Rules (BER) | Basic Encoding Rules: |
Canonical Encoding Rules (CER) | Canonical Encoding Rules: A restricted version of the BER that only allows the use of only one encoding type |
Distinguished Encoding Rules (DER) | Distinguished Encoding Rules: |
File Formats: Privacy-enhanced Electronic Mail | .pem |
File Formats: Public Key Cryptographic System #12 (PKCS#12) | .p12 |
File Formats: Personal Information Exchange | .pfx |
File Formats: Public Key Cryptographic Systems #7 (PKCS#7) | .p7b |
Registration Authority (RA) | Receives certificate signing requests |
Certificate Authority | The entity that issues certificates to a user Verisign, Digisign, and many others act as Root CA |
Certificate Revocation List (CRL) | An online list of digital certificates that the certificate authority has revoked |
Online Certificate Status Protocol (OCSP) | A protocol that allows you to determine the revocation status of a digital certificate using its serial number |
OCSP Stapling | Allows the certificate holder to get the OCSP record from the server at regular intervals and include it as part of the SSL or TLS handshake Speeds up secure tunnel creation process |
Public Key Pinning | Allows an HTTPS website to resist impersonation attacks by presenting a set of trusted public keys to the user’s web browser as part of the HTTP header |
Key Escrow & Key Recovery Agent | Key Escrow: Key Recovery Agent: |
Web of Trust | A decentralized trust model that addresses issues associated with the public authentication of public keys within a CA-based PKI system A peer-to-peer model Certificates are created as self-signed certificates Pretty Good Privacy (PGP) is a web of trust |