55 Terms

PKI
Knowledge Base

Your comprehensive guide to Public Key Infrastructure, digital certificates, and cryptography terminology.

Cryptographic Fundamentals

8 terms

Cryptography

Definition

The science of securing information by transforming it into an unreadable format using mathematical algorithms, ensuring confidentiality, integrity, and authenticity of data.

Usage

Used as the foundation for all secure digital communications, including encrypted messaging, secure web browsing, and digital signatures.

How EverTrust helps

EverTrust's PKI solutions are built on proven cryptographic standards, ensuring your certificates and keys meet the highest security requirements.

Symmetric Encryption

Definition

An encryption method where the same secret key is used for both encrypting and decrypting data, offering fast performance for bulk data protection.

Usage

Used for encrypting large volumes of data at rest or in transit, such as database encryption, file encryption, and VPN tunnels.

How EverTrust helps

EverTrust helps manage the certificates and keys that protect symmetric key exchanges, ensuring end-to-end security for encrypted communications.

Asymmetric Encryption

Definition

An encryption method using a mathematically linked key pair -a public key for encryption and a private key for decryption -enabling secure communication without shared secrets.

Usage

Used in PKI for digital signatures, certificate-based authentication, secure key exchange (e.g., TLS handshake), and encrypted email.

How EverTrust helps

EverTrust automates the lifecycle of asymmetric key pairs and their associated certificates across your entire infrastructure.

Public Key

Definition

A cryptographic key used for encrypting data or verifying digital signatures, paired with a private key.

Usage

Used to encrypt sensitive data and validate signatures in PKI frameworks for secure transactions.

How EverTrust helps

EverTrust provides secure public key management and automated key lifecycle tools.

Private Key

Definition

A confidential cryptographic key used to decrypt data or create digital signatures for secure operations.

Usage

Used to decrypt information encrypted with a public key or sign data for authentication purposes.

How EverTrust helps

EverTrust secures private keys using encryption standards and secure key storage solutions.

Key Pair

Definition

A set of cryptographic keys (public and private) used together for encryption, decryption, and digital signatures.

Usage

Used for asymmetric encryption where data encrypted with one key is decrypted with the other.

How EverTrust helps

EverTrust provides secure key pair generation, storage, and lifecycle management.

Digital Signature

Definition

A cryptographic mechanism that uses a private key to sign data, allowing anyone with the corresponding public key to verify the signer's identity and data integrity.

Usage

Used to authenticate the origin of documents, software, emails, and transactions, providing non-repudiation and tamper detection.

How EverTrust helps

EverTrust manages the certificates used for digital signing, ensuring your signing keys remain valid, trusted, and compliant.

Hashing

Definition

A one-way cryptographic function that converts data of any size into a fixed-length string (hash), used for integrity verification and password storage.

Usage

Used for verifying file integrity, storing passwords securely, generating certificate fingerprints, and building digital signatures.

How EverTrust helps

EverTrust leverages industry-standard hash algorithms across its platform to ensure certificate integrity and secure validation processes.

PKI - Actors & Architecture

12 terms

PKI (Public Key Infrastructure)

Definition

A framework managing digital keys and certificates to secure data and verify identities in secure communications.

Usage

Used for securing transactions, encrypting data, and verifying user identities in digital environments.

How EverTrust helps

EverTrust provides automated PKI management with tools for certificate issuance and lifecycle automation.

Digital Certificate

Definition

A digital file linking a public key to an identity, ensuring authenticity in secure communications.

Usage

Used to verify server, user, or device identities in encrypted communications and data exchanges.

How EverTrust helps

EverTrust offers automated certificate issuance and lifecycle management for security compliance.

Certificate Authority (CA)

Definition

A trusted entity that issues and manages digital certificates for verifying identities in secure communications.

Usage

Used for validating identities and ensuring trust within a PKI by issuing digital certificates.

How EverTrust helps

EverTrust automates CA management with lifecycle tools and compliance monitoring.

Registration Authority (RA)

Definition

An entity that verifies the identity of certificate requesters before the Certificate Authority issues a certificate, acting as a gatekeeper in the PKI trust model.

Usage

Used in enterprise PKI to delegate identity verification, enforce enrollment policies, and streamline certificate issuance workflows.

How EverTrust helps

EverTrust's workflow engine acts as a powerful RA, automating identity verification and approval processes before certificate issuance.

Validation Authority (VA)

Definition

A PKI component responsible for providing real-time certificate status information, typically via OCSP or CRL distribution, to relying parties.

Usage

Used to check whether a certificate has been revoked or is still valid, enabling trust decisions in real time.

How EverTrust helps

EverTrust integrates with Validation Authorities to provide continuous certificate status monitoring and revocation checking.

Root Certificate

Definition

A top-level certificate that establishes trust in a PKI hierarchy and signs other certificates.

Usage

Used as the foundation of trust to validate certificates issued within a PKI structure.

How EverTrust helps

EverTrust simplifies root certificate management with secure storage and monitoring tools.

Intermediate Certificate

Definition

A certificate issued by a root CA to sign other certificates and extend trust within a PKI.

Usage

Used for extending trust from the root certificate to additional end-entity certificates.

How EverTrust helps

EverTrust automates intermediate certificate issuance and lifecycle tracking.

X.509

Definition

The international standard (ITU-T) defining the format of public key certificates, including fields like subject, issuer, validity period, and extensions used across PKI systems.

Usage

Used as the universal format for TLS/SSL certificates, email certificates, code signing certificates, and any PKI-based identity verification.

How EverTrust helps

EverTrust fully supports X.509 certificate management, parsing all standard fields and extensions for comprehensive lifecycle oversight.

Certificate Chain of Trust

Definition

The hierarchical sequence of certificates -from an end-entity certificate through intermediate CAs up to a trusted root CA -that allows relying parties to verify authenticity.

Usage

Used by browsers, applications, and devices to validate that a certificate was issued by a trusted authority before establishing a secure connection.

How EverTrust helps

EverTrust provides full chain-of-trust visibility, alerting you to broken chains, missing intermediates, or untrusted roots across your infrastructure.

Certificate Transparency (CT)

Definition

An open framework of public, append-only logs that record all issued TLS certificates, enabling domain owners and the public to detect misissued or rogue certificates.

Usage

Used to monitor certificate issuance for your domains, detect unauthorized certificates, and improve overall trust in the web PKI ecosystem.

How EverTrust helps

EverTrust monitors Certificate Transparency logs to help you detect unauthorized certificate issuance for your domains and maintain security oversight.

Certificate Revocation List (CRL)

Definition

A list of revoked certificates that should no longer be trusted within a PKI system.

Usage

Used for identifying invalid certificates to prevent security breaches.

How EverTrust helps

EverTrust automates CRL generation and distribution for secure validation.

Online Certificate Status Protocol (OCSP)

Definition

A protocol for real-time validation of a certificate's revocation status without downloading full CRLs.

Usage

Used for real-time validation of certificate status in secure web transactions.

How EverTrust helps

EverTrust supports OCSP for continuous monitoring of certificate status.

Certificate Types

6 terms

TLS/SSL Certificate

Definition

A digital certificate that authenticates a server's identity and enables encrypted connections between a client (browser) and a server using the TLS protocol.

Usage

Used on websites and web applications to enable HTTPS, protecting user data in transit and establishing trust with visitors.

How EverTrust helps

EverTrust automates the discovery, issuance, renewal, and monitoring of all your TLS/SSL certificates across environments.

S/MIME Certificate

Definition

A certificate used to digitally sign and encrypt email messages, ensuring sender authenticity and message confidentiality using the S/MIME standard.

Usage

Used in enterprise email to prevent phishing, guarantee sender identity, and protect sensitive communications from interception.

How EverTrust helps

EverTrust manages S/MIME certificate lifecycles at scale, enabling secure corporate email with automated enrollment and renewal.

Code Signing Certificate

Definition

A certificate used by software developers to digitally sign executables, scripts, and packages, proving the code's origin and integrity.

Usage

Used to build user trust in downloaded software, satisfy OS security requirements, and prevent tampering with distributed code.

How EverTrust helps

EverTrust helps secure your software supply chain by managing code signing certificate lifecycles and enforcing signing policies.

Client Authentication Certificate

Definition

A digital certificate installed on a user's device or application that proves the client's identity to a server during a TLS handshake, enabling mutual authentication.

Usage

Used for strong user authentication in VPNs, corporate networks, APIs, and zero-trust architectures as an alternative or complement to passwords.

How EverTrust helps

EverTrust streamlines client certificate provisioning and lifecycle management, making certificate-based authentication scalable across your organization.

IoT / Device Certificate

Definition

A certificate embedded in or provisioned to an IoT device or connected endpoint, establishing its unique identity and enabling secure machine-to-machine communication.

Usage

Used to authenticate devices on networks, secure firmware updates, encrypt telemetry data, and prevent unauthorized devices from connecting.

How EverTrust helps

EverTrust supports large-scale IoT certificate provisioning and lifecycle management, handling millions of device identities with automated enrollment protocols.

Wildcard Certificate

Definition

A TLS certificate that secures a domain and all its single-level subdomains using a wildcard character (*) in the Common Name or SAN field (e.g., *.example.com).

Usage

Used to simplify certificate management when many subdomains share the same server, reducing the number of certificates to manage.

How EverTrust helps

EverTrust provides full visibility and lifecycle management for wildcard certificates, helping you track where they are deployed and manage renewal across hosts.

PKI Protocols

7 terms

TLS (Transport Layer Security)

Definition

A cryptographic protocol that provides end-to-end encryption, authentication, and data integrity for communications over a network, succeeding SSL.

Usage

Used to secure web traffic (HTTPS), email, VoIP, instant messaging, and virtually all modern internet communications.

How EverTrust helps

EverTrust ensures your TLS infrastructure stays secure by automating certificate management and monitoring for expiring or weak certificates.

mTLS (Mutual TLS)

Definition

An extension of TLS where both the client and server authenticate each other using certificates, establishing bidirectional trust.

Usage

Used in zero-trust architectures, service mesh communications, API security, and any scenario where both parties must prove their identity.

How EverTrust helps

EverTrust simplifies mTLS deployments by managing both server and client certificates, automating enrollment, and monitoring trust relationships.

ACME Protocol

Definition

The Automatic Certificate Management Environment protocol, standardized in RFC 8555, that automates certificate issuance, renewal, and revocation between a CA and a server.

Usage

Used by Let's Encrypt and enterprise CAs to fully automate TLS certificate provisioning, eliminating manual certificate management tasks.

How EverTrust helps

EverTrust supports the ACME protocol, enabling automated certificate enrollment and renewal that integrates seamlessly with your existing infrastructure.

SCEP (Simple Certificate Enrollment Protocol)

Definition

A protocol designed for scalable certificate enrollment, originally developed by Cisco, allowing devices to request and receive certificates from a CA automatically.

Usage

Used primarily for MDM (Mobile Device Management) and network device certificate enrollment in enterprise environments.

How EverTrust helps

EverTrust supports SCEP-based enrollment, enabling automated certificate provisioning for mobile devices and network equipment.

EST (Enrollment over Secure Transport)

Definition

A modern certificate enrollment protocol (RFC 7030) that uses HTTPS as its transport, providing a simpler and more secure alternative to SCEP for certificate management.

Usage

Used for automated certificate enrollment in enterprise and IoT environments where a modern, standards-based enrollment protocol is required.

How EverTrust helps

EverTrust supports EST for secure, standards-compliant certificate enrollment across your device fleet and server infrastructure.

CMPv2 (Certificate Management Protocol)

Definition

A comprehensive certificate management protocol (RFC 4210) supporting the full certificate lifecycle including enrollment, renewal, revocation, and key update, widely used in telecom.

Usage

Used in telecommunications (3GPP/5G), industrial systems, and enterprise PKI deployments requiring a full-featured, standards-based management protocol.

How EverTrust helps

EverTrust supports CMPv2 for comprehensive certificate lifecycle management, particularly in telecom and critical infrastructure environments.

OCSP Stapling

Definition

A TLS extension where the server obtains a time-stamped OCSP response from the CA and 'staples' it to the TLS handshake, so the client doesn't need to contact the CA directly.

Usage

Used to improve TLS connection performance and user privacy by reducing the need for clients to make separate OCSP requests to the CA.

How EverTrust helps

EverTrust monitors OCSP stapling configurations across your infrastructure, helping ensure optimal TLS performance and certificate validation.

Certificate Lifecycle Management

8 terms

Certificate Lifecycle Management (CLM)

Definition

The end-to-end process of managing digital certificates from initial request and issuance through renewal, revocation, and replacement across an organization's infrastructure.

Usage

Used by security teams to maintain visibility and control over all certificates, prevent outages from expired certificates, and ensure compliance with security policies.

How EverTrust helps

EverTrust Horizon is a purpose-built CLM platform that provides full certificate lifecycle automation, from discovery to renewal, across all your CAs and environments.

Certificate Discovery

Definition

The automated process of scanning networks, endpoints, cloud environments, and certificate stores to find all deployed certificates, including unknown or unmanaged ones.

Usage

Used as the first step in gaining visibility over your certificate landscape, identifying shadow certificates, and building a complete inventory.

How EverTrust helps

EverTrust Horizon discovers certificates across your entire infrastructure -on-premise, cloud, and hybrid -building a comprehensive, real-time inventory.

Certificate Inventory

Definition

A centralized, up-to-date repository of all digital certificates within an organization, including metadata such as issuer, expiry date, key strength, and deployment location.

Usage

Used by IT and security teams to track certificate sprawl, plan renewals, identify compliance gaps, and prevent outages caused by expired certificates.

How EverTrust helps

EverTrust Horizon maintains a live certificate inventory with advanced filtering, alerting, and reporting capabilities for complete certificate visibility.

Certificate Enrollment

Definition

The process by which an entity (user, server, or device) requests and obtains a digital certificate from a Certificate Authority, involving identity verification and key generation.

Usage

Used whenever a new certificate is needed -for a new server, employee, device, or application -following organizational policies and approval workflows.

How EverTrust helps

EverTrust automates certificate enrollment through self-service portals, API integrations, and protocol support (ACME, SCEP, EST, CMP), reducing manual effort.

Certificate Renewal

Definition

The process of replacing an expiring certificate with a new one, typically preserving the same identity and key pair or generating a new key, before the current certificate expires.

Usage

Used to maintain uninterrupted secure services by replacing certificates before they expire, following an automated or scheduled renewal process.

How EverTrust helps

EverTrust automates certificate renewal with configurable policies, advance notifications, and automated workflows to eliminate expiration-related outages.

Certificate Revocation

Definition

The act of permanently invalidating a certificate before its scheduled expiry date, typically due to key compromise, employee departure, or policy change.

Usage

Used when a certificate can no longer be trusted -after a security incident, staff change, or system decommissioning -to prevent unauthorized use.

How EverTrust helps

EverTrust enables instant certificate revocation with automated CRL and OCSP updates, ensuring revoked certificates are immediately untrusted across your infrastructure.

Automated Certificate Management

Definition

The use of software tools and protocols to automatically handle certificate issuance, renewal, deployment, and revocation without manual intervention.

Usage

Used to scale certificate management across large environments, reduce human error, prevent outages, and keep pace with shorter certificate lifetimes.

How EverTrust helps

EverTrust provides end-to-end certificate automation via policy-driven workflows, protocol integrations (ACME, SCEP, EST), and API-first architecture.

Certificate Policy & Governance

Definition

The set of organizational rules, standards, and procedures governing how certificates are issued, used, managed, and retired within an enterprise.

Usage

Used to enforce security standards, comply with regulations (eIDAS, NIS2, DORA), define approval workflows, and maintain audit trails for certificate operations.

How EverTrust helps

EverTrust enforces certificate policies through configurable templates, approval workflows, and compliance dashboards aligned with regulatory requirements.

Security & Machine Identities

9 terms

HSM (Hardware Security Module)

Definition

A dedicated, tamper-resistant physical device that generates, stores, and manages cryptographic keys in a highly secure environment, certified to standards like FIPS 140-2/3.

Usage

Used to protect the most sensitive keys in a PKI -especially CA signing keys -from extraction or unauthorized access, meeting regulatory requirements.

How EverTrust helps

EverTrust integrates with leading HSM vendors (Thales, Entrust, Utimaco) to ensure your most critical cryptographic keys are hardware-protected.

Machine Identity

Definition

The digital credentials (certificates, keys, tokens) that uniquely identify and authenticate machines, applications, containers, and services in a network.

Usage

Used to establish trust between machines in service meshes, cloud-native architectures, APIs, and DevOps pipelines where human-based authentication is impractical.

How EverTrust helps

EverTrust provides comprehensive machine identity management, giving you visibility and control over every certificate and key in your infrastructure.

Crypto-Agility

Definition

The ability of an organization's systems and infrastructure to rapidly switch between cryptographic algorithms and key sizes without significant operational disruption.

Usage

Used to prepare for algorithm deprecation (e.g., SHA-1 sunset), emerging threats (e.g., quantum computing), and evolving compliance requirements.

How EverTrust helps

EverTrust enables crypto-agility through centralized certificate visibility, automated workflows, and algorithm tracking -key to preparing for post-quantum migration.

Non-Repudiation

Definition

A security property ensuring that the sender of a message or signer of a document cannot deny having performed the action, typically achieved through digital signatures.

Usage

Used in legal, financial, and regulatory contexts to provide irrefutable proof of authorship, approval, or transmission of digital documents and transactions.

How EverTrust helps

EverTrust manages the certificates that underpin non-repudiation, ensuring signing keys are valid, trusted, and their usage is properly audited.

Certificate Outage

Definition

A service disruption caused by an expired, misconfigured, or revoked certificate that prevents TLS connections, authentication, or other certificate-dependent operations from functioning.

Usage

Represents one of the most common yet preventable causes of downtime, impacting websites, APIs, payment systems, and internal services worldwide.

How EverTrust helps

EverTrust prevents certificate outages through proactive expiry monitoring, automated renewal workflows, and real-time alerting across your entire certificate estate.

Shadow Certificate

Definition

A certificate deployed within an organization's infrastructure that is unknown to the security team -often self-signed, issued by unauthorized CAs, or provisioned outside approved processes.

Usage

Represents a significant security risk as unmanaged certificates can expire unexpectedly, use weak cryptography, or create untrusted entry points.

How EverTrust helps

EverTrust's continuous discovery capabilities detect shadow certificates across your network, bringing them into your managed inventory for proper lifecycle management.

Certificate Pinning

Definition

A security technique where an application is configured to accept only specific certificates or public keys for a given server, rejecting any other valid certificate.

Usage

Used in mobile apps and critical services to prevent man-in-the-middle attacks even if an attacker has a valid certificate from a compromised or rogue CA.

How EverTrust helps

EverTrust helps manage pinned certificates by tracking pin configurations and coordinating certificate rotations to avoid application breakage.

Key Rotation

Definition

The practice of periodically replacing cryptographic keys with new ones to limit the exposure window if a key is compromised and to comply with security policies.

Usage

Used as a security best practice for all types of keys -TLS, signing, encryption -with rotation frequency determined by risk assessment and compliance requirements.

How EverTrust helps

EverTrust automates key rotation across your infrastructure, ensuring new keys and certificates are deployed seamlessly without service disruption.

TSA (Timestamping Authority)

Definition

A trusted third-party service that cryptographically proves that a piece of data (document, signature, transaction) existed at a specific point in time.

Usage

Used in code signing, legal document management, and regulatory compliance to prove when a digital signature was created, even after the signing certificate expires.

How EverTrust helps

EverTrust manages the certificates used by Timestamping Authorities and integrates timestamping into certificate lifecycle workflows for long-term signature validity.

Post-Quantum Cryptography

5 terms

Post-Quantum Cryptography (PQC)

Definition

A new generation of cryptographic algorithms designed to be secure against attacks from both classical and quantum computers, standardized by NIST to replace vulnerable algorithms.

Usage

Used to future-proof encryption and digital signatures against the threat of quantum computers capable of breaking RSA and ECC-based cryptography.

How EverTrust helps

EverTrust helps organizations prepare for the post-quantum transition through crypto-agility features, algorithm inventory, and migration planning tools.

Harvest Now, Decrypt Later

Definition

An attack strategy where adversaries intercept and store encrypted data today with the intention of decrypting it in the future when sufficiently powerful quantum computers become available.

Usage

Represents the primary near-term threat from quantum computing, particularly for data that must remain confidential for years or decades (state secrets, health records, IP).

How EverTrust helps

EverTrust helps you identify and prioritize the certificates and keys protecting your most sensitive long-lived data, supporting your post-quantum migration roadmap.

ML-DSA (CRYSTALS-Dilithium)

Definition

A lattice-based digital signature scheme selected by NIST as the primary post-quantum standard for digital signatures (FIPS 204), designed to replace RSA and ECDSA signatures.

Usage

Will be used for certificate signing, code signing, document signing, and all applications currently relying on RSA or ECC-based digital signatures.

How EverTrust helps

EverTrust is preparing to support ML-DSA-based certificates, ensuring your PKI can transition to post-quantum signatures when standards are fully deployed.

ML-KEM (CRYSTALS-Kyber)

Definition

A lattice-based key encapsulation mechanism selected by NIST as the primary post-quantum standard for key exchange (FIPS 203), designed to replace Diffie-Hellman and ECDH.

Usage

Will be used in TLS handshakes and other key exchange protocols to establish shared secrets securely, even against quantum adversaries.

How EverTrust helps

EverTrust tracks algorithm usage across your certificate estate, helping you identify systems that will need to migrate to ML-KEM for quantum-safe key exchange.

Shor's Algorithm

Definition

A quantum computing algorithm discovered by Peter Shor in 1994 that can efficiently factor large integers and solve discrete logarithm problems, threatening RSA and ECC cryptography.

Usage

Represents the theoretical basis for why current public-key cryptography (RSA, ECC, DH) will become insecure once large-scale quantum computers are available.

How EverTrust helps

EverTrust's crypto-agility and algorithm tracking capabilities help you prepare for the Shor's algorithm threat by inventorying vulnerable certificates and planning migration.