Crypto Concepts
Key Knowledge
Certificate Circus
Security Shenanigans
Random Realms
Data Dynamics
100

Data that hasn’t been encrypted yet or has been decrypted. 

What is Plaintext?

100

A key that can be shared openly and is used in asymmetric encryption. 

What is a Public Key?

100

A server that issues digital certificates to verify identities. 

What is a Certificate Authority (CA)?

100

A certificate signed by the entity that issued it. 

What is a Self-Signed Certificate?

100

An algorithm that produces numbers that seem random.

What is a Pseudo Random Number Generator (PRNG)?

100

Information stored on specific media. 

What is Data at Rest?

200

Data that has been transformed into an unreadable format. 

What is Ciphertext?

200

A key that is kept secret and is used in asymmetric encryption. 

What are Private Keys?

200

Public authorities that issue certificates for multiple domains. 

What are Third Party CAs?

200

A file sent to a certificate authority to request a certificate. 

What is a Certificate Signing Request (CSR)?

200

A measure of randomness in a system. 

What is Entropy?

200

Information being transmitted between hosts. 

What is Data in Transit (or Data in Motion)?

300

The practice of making data unreadable to those without permission. 

What is Cryptography?

300

The size of a piece of information used in encryption, measured in bits. 

What is Key Length?

300

A digital document that verifies the identity of a user or host. 

What is a Digital Certificate?

300

An attribute expressing a host or username in a digital certificate. 

What is a Common Name (CN)?

300

A method of generating random values by sampling physical phenomena. 

What is a True Random Number Generator (TRNG)?

300

Information present in the volatile memory of a host. 

What is Data in Use (or Data in Processing)?

400

A piece of information used with an algorithm to encrypt or decrypt data. 

What is a Key?

400

A function that changes data into a fixed-length value. 

What is Hashing?

400

An encrypted message digest used to verify the sender’s identity and message integrity. 

What is a Digital Signature?

400

A field in a certificate allowing multiple host names. 

What is a Subject Alternative Name (SAN)?

400

Methods that allow programs to interact with each other. 

What is an Application Programming Interface (API)?

400

Targets for data-at-rest encryption, ranging from more granular to less granular. 

What are Encryption Levels?

500

The study of decoding encrypted messages. 

What is Cryptanalysis?

500

A hashing function that produces a 128-bit value. 

What is the Message Digest Algorithm #5 (MD5)?

500

A system of digital certificates and authorities used to verify identities. 

What is Public Key Infrastructure (PKI)?

500

A certificate that matches multiple subdomains. 

What is a Wildcard Domain?

500

Storing a backup key with a third party. 

What is Escrow?

500

Methods for transferring cryptographic keys among users. 

What is Key Exchange?

600

A method where the same key is used for both encryption and decryption. 

What is Symmetric Encryption?

600

A hashing algorithm designed to address weaknesses in earlier versions. 

What is the Secure Hash Algorithm (SHA)?

600

A top-level certificate authority in a hierarchical structure. 

What is a Root Certificate?

600

A list of certificates that have been revoked. 

What is a Certificate Revocation List (CRL)?

600

CPU extensions that protect data in memory. 

What is a Secure Enclave?

600

Encryption applied to data-in-motion. 

What is Transport/Communication Encryption?

700

A set of steps used to change readable data into an unreadable format. 

What is an Algorithm?

700

Basic components used in cryptographic systems. 

What is a Cryptographic Primitive?

700

A method of verifying a certificate by tracing its signing authorities. 

What is Certificate Chaining?

700

A protocol that allows clients to check the status of a certificate. 

What is the Online Certificate Status Protocol (OCSP)?

700

A device for generating and storing cryptographic keys. 

What is a Hardware Security Module (HSM)?

700

Ensures that if a key is compromised, only a single session is affected. 

What is Perfect Forward Secrecy (PFS)?

800

The process of converting readable data into an unreadable format to protect it. 

What is Encryption?

800

A method that uses a pair of keys, one public and one private, for encryption and decryption. 

What is an Asymmetric Algorithm?

800

Standards that promote the use of public key infrastructure. 

What are Public Key Cryptography Standards (PKCS)?

800

Tools and procedures for managing cryptographic keys. 

What is a Key Management System?

800

Hardware-based storage for encryption keys and other sensitive information. 

What is a Trusted Platform Module (TPM)?

800

A method used to verify both the integrity and authenticity of a message.

What is a Hash-based Message Authentication Code (HMAC)?

M
e
n
u