public key
public-key cryptography
public-key infrastructure
(PKI)
R
RC2, RC4
Red Hat Certificate System
registration
root CA
RSA algorithm
RSA key exchange
S
sandbox
Secure Sockets Layer
(SSL)
self tests
server authentication
One of a pair of keys used in public-key cryptography. The public
key is distributed freely and published as part of a certificate. It is
typically used to encrypt data sent to the public key's owner, who then
decrypts the data with the corresponding
A set of well-established techniques and standards that allow
an entity to verify its identity electronically or to sign and encrypt
electronic data. Two keys are involved, a public key and a private key.
public key
A
is published as part of a certificate, which associates that
key with a particular identity. The corresponding private key is kept
secret. Data encrypted with the public key can be decrypted only with
the private key.
The standards and services that facilitate the use of public-key
cryptography and X.509 v3 certificates in a networked environment.
Cryptographic algorithms developed for RSA Data Security by Rivest.
cryptographic
See also
A highly configurable set of software components and tools for
creating, deploying, and managing certificates. Certificate System is
comprised of five major subsystems that can be installed in different
Certificate System instances in different physical locations:
Manager, Online Certificate Status Manager,
Manager, Token Key Service, and Token Processing System.
See enrollment.
certificate authority (CA)
The
a certificate chain. See also
Short for Rivest-Shamir-Adleman, a public-key algorithm for both
encryption and authentication. It was developed by Ronald Rivest, Adi
Shamir, and Leonard Adleman and introduced in 1978.
A key-exchange algorithm for SSL based on the RSA algorithm.
A Java™ term for the carefully defined limits within which Java™
code must operate.
A protocol that allows mutual authentication between a client and
server and the establishment of an authenticated and encrypted
connection. SSL runs above TCP/IP and below HTTP, LDAP, IMAP,
NNTP, and other high-level network protocols.
A feature that tests a Certificate System instance both when the
instance starts up and on-demand.
The process of identifying a server to a client. See also
authentication.
private
algorithm.
Data Recovery
with a self-signed certificate at the top of
CA
certificate,
subordinate
key.
Certificate
CA.
client
531
Need help?
Do you have a question about the CERTIFICATE SYSTEM 8.0 - ADMINISTRATION and is the answer not in the manual?
Questions and answers