022.1 Cryptography and Public Key Infrastructure
- Reference to LPI objectives
- Weight
-
3
- Key knowledge areas
-
-
Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography
-
Understanding of the concept of Perfect Forward Secrecy
-
Understanding of the concepts of hash functions, ciphers, and key exchange algorithms
-
Understanding of the differences between end-to-end encryption and transport encryption
-
Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs
-
Understanding of the concepts X.509 certificates
-
Understanding of how X.509 certificates are requested and issued
-
Awareness of certificate revocation
-
Awareness of Let’s Encrypt
-
Awareness of important cryptographic algorithms
-
- Partial list of the used files, terms and utilities
-
-
Public Key Infrastructures (PKI)
-
Certificate Authorities
-
Trusted Root-CAs
-
Certificate Signing Requests (CSR) and certificates
-
X.509 certificate fields: Subject, Issuer, Validity
-
RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography
-