Matching Pairs Security+ 601: Cryptography - Part 1Online version Match the terms and defintions; Part 1 focus more on practical definitions by Name Here Name 1 Certificate Pinning 2 Digital signature 3 Cryptographic attack/cryptanalysis 4 PKI (Public Key Infrastructure) 5 P7B 6 PKCS (Public Key Cryptography Standards) 7 Key Escrow 8 Certificate Chaining 9 P12 10 CA (Certificate authority) 11 CRL (Certificate revocation list) 12 Trust Model 13 Certificate Stapling The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Finding weaknesses in the cryptosystem Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA A set of protocols that facilitate the use of public key infrastructure in data exchange The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed A file extension used for storing private keys with a certificate; can chain certificates Associates certificate against known copy Third party safeguarding private keys A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key A trusted entity that issues Secure Sockets Layer (SSL) certificates Checks regularly for certificate invalidity