Matching Pairs Security+ 601: Cryptography - Part 1Online version Match the terms and defintions; Part 1 focus more on practical definitions by Name Here Name 1 Cryptographic attack/cryptanalysis 2 P7B 3 PKCS (Public Key Cryptography Standards) 4 Certificate Stapling 5 CRL (Certificate revocation list) 6 P12 7 Digital signature 8 Trust Model 9 Certificate Chaining 10 CA (Certificate authority) 11 PKI (Public Key Infrastructure) 12 Certificate Pinning 13 Key Escrow A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Third party safeguarding private keys A trusted entity that issues Secure Sockets Layer (SSL) certificates A file extension used for storing private keys with a certificate; can chain certificates Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed A set of protocols that facilitate the use of public key infrastructure in data exchange Finding weaknesses in the cryptosystem Associates certificate against known copy Checks regularly for certificate invalidity The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation