Encryption and Key Management
Terms for encryption, hashing, certificates, keys, signatures, and the trust mechanisms used to protect data and communication.
Encryption and Key Management
This section covers encryption, certificates, signatures, hashing, and key-management vocabulary.
Use it when the question is about protecting data, proving integrity, establishing trust, or managing cryptographic material.
Core Articles
Start With Certificate Trust
If your main question is how certificate-based trust actually works, use this route:
- Public Key Infrastructure
- Certificate Authority
- Digital Certificate
- TLS
- Certificate Revocation
- Online Certificate Status Protocol
- Mutual TLS
Bridge Into Network Security
These topics connect directly to Firewall, Web Application Firewall, Virtual Private Network, and Zero Trust Network Access because trust, certificates, and transport protection are part of real network defense.
Trace A Suspicious Certificate
If the question starts with “why did this certificate show up?” use this route:
- Digital Certificate
- Certificate Authority
- Certificate Transparency
- Certificate Revocation
- Online Certificate Status Protocol
Protect Passwords And High-Value Keys
If the question is about storing passwords safely or protecting central encryption keys, use this route:
- Hashing
- Salting
- Envelope Encryption
- Hardware Security Module
- Key Rotation
Learn The Core Cryptography Roles
If the question is “which cryptographic tool does what?” use this route:
- Symmetric Encryption
- Asymmetric Encryption
- Digital Signature
- Secure Transport
- Perfect Forward Secrecy
- Key Rotation
In this section
- Asymmetric Encryption with Key Pairs
Encryption that uses public and private key pairs so trust is possible without sharing one secret key.
- Certificate Authority
A certificate authority issues and signs certificates that other systems may trust as part of a public key infrastructure.
- Certificate Pinning for Client Trust
Certificate pinning is a trust restriction that tells an application to accept only specific certificates or public keys for a destination instead of relying on the full public trust store alone.
- Certificate Revocation in PKI
Certificate revocation is the process of marking a certificate as no longer trustworthy before its normal expiration date.
- Certificate Transparency for Trust Visibility
Certificate Transparency is a public certificate-logging approach that makes certificate issuance easier to observe and investigate when unexpected trust events occur.
- Digital Certificates and Identity Binding
Certificate that binds a public key to an identity so systems can decide whether to trust it.
- Digital Signatures for Integrity
Cryptographic signature that proves origin and detects whether data changed after signing.
- Envelope Encryption for Scalable Key Control
Envelope encryption is a design where data is encrypted with one key and that key is then protected with another key used for stronger centralized control.
- Hardware Security Modules for Key Protection
A hardware security module is a dedicated device or managed service designed to protect cryptographic keys and perform sensitive cryptographic operations.
- Hashing for Integrity and Verification
Hashing transforms input data into a fixed-length digest used for integrity checks, comparison, and secure password-storage workflows.
- Key Escrow for Recovery Access
Key escrow is the practice of storing a recoverable copy of a cryptographic key with a trusted authority or process.
- Key Rotation for Cryptographic Safety
Key rotation is the practice of replacing cryptographic keys on a defined schedule or when risk changes so long-lived exposure is reduced.
- Mutual TLS
Mutual TLS is a form of TLS in which both sides of a connection authenticate with certificates instead of only the server doing so.
- Online Certificate Status Protocol
The Online Certificate Status Protocol is a way for systems to check whether a certificate has been revoked without relying only on expiration dates.
- Perfect Forward Secrecy in TLS
Perfect forward secrecy helps ensure that compromise of a long-term key does not automatically expose past encrypted sessions.
- Public Key Infrastructure
Public key infrastructure is the trust framework that manages key pairs, certificates, and authorities so systems can verify identity and establish trust.
- Salting for Password Storage
Salting is the practice of adding unique random data to a value before hashing it so identical inputs do not produce the same stored result.
- Secure Transport for Data in Transit
Secure transport is the broader practice of protecting data while it moves between systems so communication remains confidential, intact, and appropriately authenticated.
- Symmetric Encryption with Shared Keys
Encryption that uses one shared secret for both encryption and decryption, making key control central to safety.
- Transport Layer Security (TLS)
TLS is the protocol family widely used to protect data in transit by authenticating endpoints and establishing encrypted communication.