Matching Pairs Security+ 601: Cryptography - Part 1Online version Match the terms and defintions; Part 1 focus more on practical definitions by Name Here Name 1 P12 2 Key Escrow 3 PKI (Public Key Infrastructure) 4 Trust Model 5 Certificate Stapling 6 Digital signature 7 Cryptographic attack/cryptanalysis 8 PKCS (Public Key Cryptography Standards) 9 CA (Certificate authority) 10 Certificate Chaining 11 Certificate Pinning 12 CRL (Certificate revocation list) 13 P7B Finding weaknesses in the cryptosystem Top-down CA trust model; Any certificate that is between the device that you're connecting to and the root CA Public key sender verified to own corresponding private key; provides a mechanism for verifying origin authentication, integrity, and non-repudiation A file extension for a certificate for public key sharing; Most commonly used on the Tomcat; Does not have private key A type of blocklist that includes certificates that should no longer be trusted; verified with web browsers Associates certificate against known copy The set of technology and processes required to create, manage, distribute, use, store, and revoke digital certs and public-keys A set of protocols that facilitate the use of public key infrastructure in data exchange A file extension used for storing private keys with a certificate; can chain certificates A trusted entity that issues Secure Sockets Layer (SSL) certificates Third party safeguarding private keys Checks regularly for certificate invalidity The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate; Direct, 3rd-Party, Hierarchical, Distributed