Glossary
Data Encryption Standard
(DES)
delta CRL
digital ID
digital signature
distribution points
distinguished name (DN)
dual key pair
E
eavesdropping
encryption
encryption key
enrollment
end entity
516
A FIPS-approved cryptographic algorithm required by FIPS 140-1
and specified by FIPS PUBS 46-2. DES, which uses 56-bit keys,
is a standard encryption and decryption algorithm that has been
used successfully throughout the world for more than 20 years.
FIPS PUBS
140-1. For detailed information, see
See also
www.itl.nist.gov/div897/pubs/fip46-2.htm
A CRL containing a list of those certificates that have been revoked
since the last full CRL was issued.
See certificate.
To create a digital signature, the signing software first creates a
one-way hash
from the data to be signed, such as a newly issued
certificate. The one-way hash is then encrypted with the private key of
the signer. The resulting digital signature is unique for each piece of
data signed. Even a single comma added to a message changes the
digital signature for that message. Successful decryption of the digital
signature with the signer's public key and comparison with another
hash of the same data provides
certificate chain
for the certificate containing the public key provides
authentication of the signer. See also nonrepudiation, encryption.
Used for CRLs to define a set of certificates. Each distribution point is
defined by a set of certificates that are issued. A CRL can be created
for a particular distribution point.
A series of AVAs that identify the subject of a certificate. See
value assertion
(AVA).
Two public-private key pairs, four keys altogether, corresponding
to two separate certificates. The private key of one pair is used for
signing operations, and the public and private keys of the other
pair are used for encryption and decryption operations. Each pair
corresponds to a separate certificate. See also
key
cryptography,
signing
Surreptitious interception of information sent over a network by an
entity for which the information is not intended.
Scrambling information in a way that disguises its meaning. See
decryption.
A private key used for encryption only. An encryption key and its
equivalent public key, plus a
dual key
pair.
constitute a
The process of requesting and receiving an X.509 certificate for use
public-key infrastructure
in a
public-key infrastructure
In a
certificate
entity that uses a
tamper
detection. Verification of the
encryption
key.
signing key
and its equivalent public key,
(PKI). Also known as registration.
(PKI), a person, router, server, or other
to identify itself.
http://
attribute
key,
public-
Need help?
Do you have a question about the CERTIFICATE SYSTEM 7.3 - ADMINISTRATION and is the answer not in the manual?
Questions and answers