Red Hat CERTIFICATE SYSTEM 8.0 - ADMINISTRATION Admin Manual page 548

Hide thumbs Also See for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION:
Table of Contents

Advertisement

Glossary
decryption
Data Encryption Standard
(DES)
delta CRL
digital ID
digital signature
distribution points
distinguished name (DN)
dual key pair
E
eavesdropping
Elliptic Curve Cryptography
(ECC)
526
Recovery Manager uses the private key corresponding to the certified
public key to decrypt the end entity's key before encrypting it with the
storage key.
Unscrambling data that has been encrypted. See encryption.
A FIPS-approved cryptographic algorithm required by FIPS 140-1
and specified by FIPS PUBS 46-2. DES, which uses 56-bit keys,
is a standard encryption and decryption algorithm that has been
used successfully throughout the world for more than 20 years.
FIPS PUBS
140-1. For detailed information, see
See also
www.itl.nist.gov/div897/pubs/fip46-2.htm
A CRL containing a list of those certificates that have been revoked
since the last full CRL was issued.
See certificate.
To create a digital signature, the signing software first creates a
one-way hash
from the data to be signed, such as a newly issued
certificate. The one-way hash is then encrypted with the private key of
the signer. The resulting digital signature is unique for each piece of
data signed. Even a single comma added to a message changes the
digital signature for that message. Successful decryption of the digital
signature with the signer's public key and comparison with another
hash of the same data provides
certificate chain
for the certificate containing the public key provides
authentication of the signer. See also nonrepudiation, encryption.
Used for CRLs to define a set of certificates. Each distribution point is
defined by a set of certificates that are issued. A CRL can be created
for a particular distribution point.
A series of AVAs that identify the subject of a certificate. See
value assertion
(AVA).
Two public-private key pairs, four keys altogether, corresponding
to two separate certificates. The private key of one pair is used for
signing operations, and the public and private keys of the other
pair are used for encryption and decryption operations. Each pair
corresponds to a separate certificate. See also
key
cryptography,
signing
Surreptitious interception of information sent over a network by an
entity for which the information is not intended.
A cryptographic algorithm which uses elliptic curves to create additive
logarithms for the mathematical problems which are the basis of
the cryptographic keys. ECC ciphers are more efficient to use than
RSA ciphers and, because of their intrinsic complexity, are stronger
tamper
detection. Verification of the
encryption
key.
http://
attribute
key,
public-

Advertisement

Table of Contents
loading

Table of Contents