Glossary
Asymmetric cryptography methods / Public key methods | Each key holder has a pair of keys. This enables encryption, decryption and digital signatures. |
BTU CA Global | Certification authority within the DFN PKI. The root CA (top certification authority, root authority) is T-TeleSec GlobalRoot Class 2 (until mid-2033). The DFN-Verein Global Issuing CA issues user certificates for members of the BTU Cottbus-Senftenberg and server certificates. |
Digital Signature | Electronic signature |
Cryptographie | Includes algorithms, keys and certificates for encrypting, decrypting, signing, verifying signatures and creating checksums. Cryptography is used to secure
|
User certificates | Certificates (comparable to digital ID cards) for students and employees of BTU Cottbus-Senftenberg, which can be used for encrypting/digitally signing emails, for authentication (e.g. on server applications) and for VPN/WLAN access at BTU Cottbus-Senftenberg. |
Öffentlicher Schlüssel / Public Key | For digital signatures:
|
PKI | Structure in which digital certificates are issued using asymmetric encryption methods. It is often organised hierarchically: A root instance works with a self-signed root certificate and issues certificates for CAs, which are then able to issue certificates themselves. The system used at BTU is structured as follows: T-TeleSec GlobalRoot Class 2 -> DFN-Verein Certification Authority 2 -> DFN-Verein Global Issuing CA -> Users and servers |
Policy / Richtlinien | All guidelines of a certification authority that specify how audits are conducted and how work is performed. This allows every user to determine whether they can trust the authority. |
Privater Schlüssel / Private Key | For digital signatures:
|
key pair | Consists of a private key and a public key. |
Server certificate | Certificates for servers are used to encrypt the connection between the client and server and to ensure the authenticity of servers. |
Sperrlisten / Certificate Revocation Lists / CRLs | Lists of blocked (withdrawn) and invalid certificates. |
SSL (Secure Socket Layer) / TLS (Transport Layer Security) | pplication protocol for X.509 certificates. Both asymmetric and symmetric encryption methods are used, which is also referred to as hybrid encryption. TLS is the further development of SSL. |
Symmetric cryptography methods | The same secret key is used for both encryption and decryption. Problem: exchange of the key and the information that protects it (password, passphrase, PIN). |
X.509 | Standards for certificates and CRLs, among other things. |
Certificate | A form of public key that can be processed by applications. Each certificate has a unique name. This name associates the certificate with a user, but usually also with an organisation. During certification, the identity of the user is verified and confirmed by a digital signature from a certification authority. |
Zertifizierungsstelle / Certification Authority / CA | Trusted authority that confirms the link between a public key and its owner following a verification procedure specified in the policy. |
*.p12- oder *.pfx-file | Contains both the private key and the certificate. This file can be imported into the applications used (browser, email client, VPN client). This file must be kept secure, as it contains the private key. |