PKI
Knowledge Base
Your comprehensive guide to Public Key Infrastructure, digital certificates, and cryptography terminology.
Cryptographic Fundamentals
8 termsCryptography
Definition
The science of securing information by transforming it into an unreadable format using mathematical algorithms, ensuring confidentiality, integrity, and authenticity of data.
Usage
Used as the foundation for all secure digital communications, including encrypted messaging, secure web browsing, and digital signatures.
How EverTrust helps
EverTrust's PKI solutions are built on proven cryptographic standards, ensuring your certificates and keys meet the highest security requirements.
Symmetric Encryption
Definition
An encryption method where the same secret key is used for both encrypting and decrypting data, offering fast performance for bulk data protection.
Usage
Used for encrypting large volumes of data at rest or in transit, such as database encryption, file encryption, and VPN tunnels.
How EverTrust helps
EverTrust helps manage the certificates and keys that protect symmetric key exchanges, ensuring end-to-end security for encrypted communications.
Asymmetric Encryption
Definition
An encryption method using a mathematically linked key pair -a public key for encryption and a private key for decryption -enabling secure communication without shared secrets.
Usage
Used in PKI for digital signatures, certificate-based authentication, secure key exchange (e.g., TLS handshake), and encrypted email.
How EverTrust helps
EverTrust automates the lifecycle of asymmetric key pairs and their associated certificates across your entire infrastructure.
Public Key
Definition
A cryptographic key used for encrypting data or verifying digital signatures, paired with a private key.
Usage
Used to encrypt sensitive data and validate signatures in PKI frameworks for secure transactions.
How EverTrust helps
EverTrust provides secure public key management and automated key lifecycle tools.
Private Key
Definition
A confidential cryptographic key used to decrypt data or create digital signatures for secure operations.
Usage
Used to decrypt information encrypted with a public key or sign data for authentication purposes.
How EverTrust helps
EverTrust secures private keys using encryption standards and secure key storage solutions.
Key Pair
Definition
A set of cryptographic keys (public and private) used together for encryption, decryption, and digital signatures.
Usage
Used for asymmetric encryption where data encrypted with one key is decrypted with the other.
How EverTrust helps
EverTrust provides secure key pair generation, storage, and lifecycle management.
Digital Signature
Definition
A cryptographic mechanism that uses a private key to sign data, allowing anyone with the corresponding public key to verify the signer's identity and data integrity.
Usage
Used to authenticate the origin of documents, software, emails, and transactions, providing non-repudiation and tamper detection.
How EverTrust helps
EverTrust manages the certificates used for digital signing, ensuring your signing keys remain valid, trusted, and compliant.
Hashing
Definition
A one-way cryptographic function that converts data of any size into a fixed-length string (hash), used for integrity verification and password storage.
Usage
Used for verifying file integrity, storing passwords securely, generating certificate fingerprints, and building digital signatures.
How EverTrust helps
EverTrust leverages industry-standard hash algorithms across its platform to ensure certificate integrity and secure validation processes.
PKI - Actors & Architecture
12 termsPKI (Public Key Infrastructure)
Definition
A framework managing digital keys and certificates to secure data and verify identities in secure communications.
Usage
Used for securing transactions, encrypting data, and verifying user identities in digital environments.
How EverTrust helps
EverTrust provides automated PKI management with tools for certificate issuance and lifecycle automation.
Digital Certificate
Definition
A digital file linking a public key to an identity, ensuring authenticity in secure communications.
Usage
Used to verify server, user, or device identities in encrypted communications and data exchanges.
How EverTrust helps
EverTrust offers automated certificate issuance and lifecycle management for security compliance.
Root Certificate
Definition
A top-level certificate that establishes trust in a PKI hierarchy and signs other certificates.
Usage
Used as the foundation of trust to validate certificates issued within a PKI structure.
How EverTrust helps
EverTrust simplifies root certificate management with secure storage and monitoring tools.
Intermediate Certificate
Definition
A certificate issued by a root CA to sign other certificates and extend trust within a PKI.
Usage
Used for extending trust from the root certificate to additional end-entity certificates.
How EverTrust helps
EverTrust automates intermediate certificate issuance and lifecycle tracking.
X.509
Definition
The international standard (ITU-T) defining the format of public key certificates, including fields like subject, issuer, validity period, and extensions used across PKI systems.
Usage
Used as the universal format for TLS/SSL certificates, email certificates, code signing certificates, and any PKI-based identity verification.
How EverTrust helps
EverTrust fully supports X.509 certificate management, parsing all standard fields and extensions for comprehensive lifecycle oversight.
Certificate Chain of Trust
Definition
The hierarchical sequence of certificates -from an end-entity certificate through intermediate CAs up to a trusted root CA -that allows relying parties to verify authenticity.
Usage
Used by browsers, applications, and devices to validate that a certificate was issued by a trusted authority before establishing a secure connection.
How EverTrust helps
EverTrust provides full chain-of-trust visibility, alerting you to broken chains, missing intermediates, or untrusted roots across your infrastructure.
Certificate Transparency (CT)
Definition
An open framework of public, append-only logs that record all issued TLS certificates, enabling domain owners and the public to detect misissued or rogue certificates.
Usage
Used to monitor certificate issuance for your domains, detect unauthorized certificates, and improve overall trust in the web PKI ecosystem.
How EverTrust helps
EverTrust monitors Certificate Transparency logs to help you detect unauthorized certificate issuance for your domains and maintain security oversight.
Certificate Revocation List (CRL)
Definition
A list of revoked certificates that should no longer be trusted within a PKI system.
Usage
Used for identifying invalid certificates to prevent security breaches.
How EverTrust helps
EverTrust automates CRL generation and distribution for secure validation.
Online Certificate Status Protocol (OCSP)
Definition
A protocol for real-time validation of a certificate's revocation status without downloading full CRLs.
Usage
Used for real-time validation of certificate status in secure web transactions.
How EverTrust helps
EverTrust supports OCSP for continuous monitoring of certificate status.
Certificate Types
6 termsTLS/SSL Certificate
Definition
A digital certificate that authenticates a server's identity and enables encrypted connections between a client (browser) and a server using the TLS protocol.
Usage
Used on websites and web applications to enable HTTPS, protecting user data in transit and establishing trust with visitors.
How EverTrust helps
EverTrust automates the discovery, issuance, renewal, and monitoring of all your TLS/SSL certificates across environments.
S/MIME Certificate
Definition
A certificate used to digitally sign and encrypt email messages, ensuring sender authenticity and message confidentiality using the S/MIME standard.
Usage
Used in enterprise email to prevent phishing, guarantee sender identity, and protect sensitive communications from interception.
How EverTrust helps
EverTrust manages S/MIME certificate lifecycles at scale, enabling secure corporate email with automated enrollment and renewal.
Code Signing Certificate
Definition
A certificate used by software developers to digitally sign executables, scripts, and packages, proving the code's origin and integrity.
Usage
Used to build user trust in downloaded software, satisfy OS security requirements, and prevent tampering with distributed code.
How EverTrust helps
EverTrust helps secure your software supply chain by managing code signing certificate lifecycles and enforcing signing policies.
Client Authentication Certificate
Definition
A digital certificate installed on a user's device or application that proves the client's identity to a server during a TLS handshake, enabling mutual authentication.
Usage
Used for strong user authentication in VPNs, corporate networks, APIs, and zero-trust architectures as an alternative or complement to passwords.
How EverTrust helps
EverTrust streamlines client certificate provisioning and lifecycle management, making certificate-based authentication scalable across your organization.
IoT / Device Certificate
Definition
A certificate embedded in or provisioned to an IoT device or connected endpoint, establishing its unique identity and enabling secure machine-to-machine communication.
Usage
Used to authenticate devices on networks, secure firmware updates, encrypt telemetry data, and prevent unauthorized devices from connecting.
How EverTrust helps
EverTrust supports large-scale IoT certificate provisioning and lifecycle management, handling millions of device identities with automated enrollment protocols.
Wildcard Certificate
Definition
A TLS certificate that secures a domain and all its single-level subdomains using a wildcard character (*) in the Common Name or SAN field (e.g., *.example.com).
Usage
Used to simplify certificate management when many subdomains share the same server, reducing the number of certificates to manage.
How EverTrust helps
EverTrust provides full visibility and lifecycle management for wildcard certificates, helping you track where they are deployed and manage renewal across hosts.
PKI Protocols
7 termsTLS (Transport Layer Security)
Definition
A cryptographic protocol that provides end-to-end encryption, authentication, and data integrity for communications over a network, succeeding SSL.
Usage
Used to secure web traffic (HTTPS), email, VoIP, instant messaging, and virtually all modern internet communications.
How EverTrust helps
EverTrust ensures your TLS infrastructure stays secure by automating certificate management and monitoring for expiring or weak certificates.
mTLS (Mutual TLS)
Definition
An extension of TLS where both the client and server authenticate each other using certificates, establishing bidirectional trust.
Usage
Used in zero-trust architectures, service mesh communications, API security, and any scenario where both parties must prove their identity.
How EverTrust helps
EverTrust simplifies mTLS deployments by managing both server and client certificates, automating enrollment, and monitoring trust relationships.
ACME Protocol
Definition
The Automatic Certificate Management Environment protocol, standardized in RFC 8555, that automates certificate issuance, renewal, and revocation between a CA and a server.
Usage
Used by Let's Encrypt and enterprise CAs to fully automate TLS certificate provisioning, eliminating manual certificate management tasks.
How EverTrust helps
EverTrust supports the ACME protocol, enabling automated certificate enrollment and renewal that integrates seamlessly with your existing infrastructure.
SCEP (Simple Certificate Enrollment Protocol)
Definition
A protocol designed for scalable certificate enrollment, originally developed by Cisco, allowing devices to request and receive certificates from a CA automatically.
Usage
Used primarily for MDM (Mobile Device Management) and network device certificate enrollment in enterprise environments.
How EverTrust helps
EverTrust supports SCEP-based enrollment, enabling automated certificate provisioning for mobile devices and network equipment.
EST (Enrollment over Secure Transport)
Definition
A modern certificate enrollment protocol (RFC 7030) that uses HTTPS as its transport, providing a simpler and more secure alternative to SCEP for certificate management.
Usage
Used for automated certificate enrollment in enterprise and IoT environments where a modern, standards-based enrollment protocol is required.
How EverTrust helps
EverTrust supports EST for secure, standards-compliant certificate enrollment across your device fleet and server infrastructure.
CMPv2 (Certificate Management Protocol)
Definition
A comprehensive certificate management protocol (RFC 4210) supporting the full certificate lifecycle including enrollment, renewal, revocation, and key update, widely used in telecom.
Usage
Used in telecommunications (3GPP/5G), industrial systems, and enterprise PKI deployments requiring a full-featured, standards-based management protocol.
How EverTrust helps
EverTrust supports CMPv2 for comprehensive certificate lifecycle management, particularly in telecom and critical infrastructure environments.
OCSP Stapling
Definition
A TLS extension where the server obtains a time-stamped OCSP response from the CA and 'staples' it to the TLS handshake, so the client doesn't need to contact the CA directly.
Usage
Used to improve TLS connection performance and user privacy by reducing the need for clients to make separate OCSP requests to the CA.
How EverTrust helps
EverTrust monitors OCSP stapling configurations across your infrastructure, helping ensure optimal TLS performance and certificate validation.
Certificate Lifecycle Management
8 termsCertificate Lifecycle Management (CLM)
Definition
The end-to-end process of managing digital certificates from initial request and issuance through renewal, revocation, and replacement across an organization's infrastructure.
Usage
Used by security teams to maintain visibility and control over all certificates, prevent outages from expired certificates, and ensure compliance with security policies.
How EverTrust helps
EverTrust Horizon is a purpose-built CLM platform that provides full certificate lifecycle automation, from discovery to renewal, across all your CAs and environments.
Certificate Discovery
Definition
The automated process of scanning networks, endpoints, cloud environments, and certificate stores to find all deployed certificates, including unknown or unmanaged ones.
Usage
Used as the first step in gaining visibility over your certificate landscape, identifying shadow certificates, and building a complete inventory.
How EverTrust helps
EverTrust Horizon discovers certificates across your entire infrastructure -on-premise, cloud, and hybrid -building a comprehensive, real-time inventory.
Certificate Inventory
Definition
A centralized, up-to-date repository of all digital certificates within an organization, including metadata such as issuer, expiry date, key strength, and deployment location.
Usage
Used by IT and security teams to track certificate sprawl, plan renewals, identify compliance gaps, and prevent outages caused by expired certificates.
How EverTrust helps
EverTrust Horizon maintains a live certificate inventory with advanced filtering, alerting, and reporting capabilities for complete certificate visibility.
Certificate Enrollment
Definition
The process by which an entity (user, server, or device) requests and obtains a digital certificate from a Certificate Authority, involving identity verification and key generation.
Usage
Used whenever a new certificate is needed -for a new server, employee, device, or application -following organizational policies and approval workflows.
How EverTrust helps
EverTrust automates certificate enrollment through self-service portals, API integrations, and protocol support (ACME, SCEP, EST, CMP), reducing manual effort.
Certificate Renewal
Definition
The process of replacing an expiring certificate with a new one, typically preserving the same identity and key pair or generating a new key, before the current certificate expires.
Usage
Used to maintain uninterrupted secure services by replacing certificates before they expire, following an automated or scheduled renewal process.
How EverTrust helps
EverTrust automates certificate renewal with configurable policies, advance notifications, and automated workflows to eliminate expiration-related outages.
Certificate Revocation
Definition
The act of permanently invalidating a certificate before its scheduled expiry date, typically due to key compromise, employee departure, or policy change.
Usage
Used when a certificate can no longer be trusted -after a security incident, staff change, or system decommissioning -to prevent unauthorized use.
How EverTrust helps
EverTrust enables instant certificate revocation with automated CRL and OCSP updates, ensuring revoked certificates are immediately untrusted across your infrastructure.
Automated Certificate Management
Definition
The use of software tools and protocols to automatically handle certificate issuance, renewal, deployment, and revocation without manual intervention.
Usage
Used to scale certificate management across large environments, reduce human error, prevent outages, and keep pace with shorter certificate lifetimes.
How EverTrust helps
EverTrust provides end-to-end certificate automation via policy-driven workflows, protocol integrations (ACME, SCEP, EST), and API-first architecture.
Certificate Policy & Governance
Definition
The set of organizational rules, standards, and procedures governing how certificates are issued, used, managed, and retired within an enterprise.
Usage
Used to enforce security standards, comply with regulations (eIDAS, NIS2, DORA), define approval workflows, and maintain audit trails for certificate operations.
How EverTrust helps
EverTrust enforces certificate policies through configurable templates, approval workflows, and compliance dashboards aligned with regulatory requirements.
Security & Machine Identities
9 termsHSM (Hardware Security Module)
Definition
A dedicated, tamper-resistant physical device that generates, stores, and manages cryptographic keys in a highly secure environment, certified to standards like FIPS 140-2/3.
Usage
Used to protect the most sensitive keys in a PKI -especially CA signing keys -from extraction or unauthorized access, meeting regulatory requirements.
How EverTrust helps
EverTrust integrates with leading HSM vendors (Thales, Entrust, Utimaco) to ensure your most critical cryptographic keys are hardware-protected.
Machine Identity
Definition
The digital credentials (certificates, keys, tokens) that uniquely identify and authenticate machines, applications, containers, and services in a network.
Usage
Used to establish trust between machines in service meshes, cloud-native architectures, APIs, and DevOps pipelines where human-based authentication is impractical.
How EverTrust helps
EverTrust provides comprehensive machine identity management, giving you visibility and control over every certificate and key in your infrastructure.
Crypto-Agility
Definition
The ability of an organization's systems and infrastructure to rapidly switch between cryptographic algorithms and key sizes without significant operational disruption.
Usage
Used to prepare for algorithm deprecation (e.g., SHA-1 sunset), emerging threats (e.g., quantum computing), and evolving compliance requirements.
How EverTrust helps
EverTrust enables crypto-agility through centralized certificate visibility, automated workflows, and algorithm tracking -key to preparing for post-quantum migration.
Non-Repudiation
Definition
A security property ensuring that the sender of a message or signer of a document cannot deny having performed the action, typically achieved through digital signatures.
Usage
Used in legal, financial, and regulatory contexts to provide irrefutable proof of authorship, approval, or transmission of digital documents and transactions.
How EverTrust helps
EverTrust manages the certificates that underpin non-repudiation, ensuring signing keys are valid, trusted, and their usage is properly audited.
Certificate Outage
Definition
A service disruption caused by an expired, misconfigured, or revoked certificate that prevents TLS connections, authentication, or other certificate-dependent operations from functioning.
Usage
Represents one of the most common yet preventable causes of downtime, impacting websites, APIs, payment systems, and internal services worldwide.
How EverTrust helps
EverTrust prevents certificate outages through proactive expiry monitoring, automated renewal workflows, and real-time alerting across your entire certificate estate.
Shadow Certificate
Definition
A certificate deployed within an organization's infrastructure that is unknown to the security team -often self-signed, issued by unauthorized CAs, or provisioned outside approved processes.
Usage
Represents a significant security risk as unmanaged certificates can expire unexpectedly, use weak cryptography, or create untrusted entry points.
How EverTrust helps
EverTrust's continuous discovery capabilities detect shadow certificates across your network, bringing them into your managed inventory for proper lifecycle management.
Certificate Pinning
Definition
A security technique where an application is configured to accept only specific certificates or public keys for a given server, rejecting any other valid certificate.
Usage
Used in mobile apps and critical services to prevent man-in-the-middle attacks even if an attacker has a valid certificate from a compromised or rogue CA.
How EverTrust helps
EverTrust helps manage pinned certificates by tracking pin configurations and coordinating certificate rotations to avoid application breakage.
Key Rotation
Definition
The practice of periodically replacing cryptographic keys with new ones to limit the exposure window if a key is compromised and to comply with security policies.
Usage
Used as a security best practice for all types of keys -TLS, signing, encryption -with rotation frequency determined by risk assessment and compliance requirements.
How EverTrust helps
EverTrust automates key rotation across your infrastructure, ensuring new keys and certificates are deployed seamlessly without service disruption.
Post-Quantum Cryptography
5 termsPost-Quantum Cryptography (PQC)
Definition
A new generation of cryptographic algorithms designed to be secure against attacks from both classical and quantum computers, standardized by NIST to replace vulnerable algorithms.
Usage
Used to future-proof encryption and digital signatures against the threat of quantum computers capable of breaking RSA and ECC-based cryptography.
How EverTrust helps
EverTrust helps organizations prepare for the post-quantum transition through crypto-agility features, algorithm inventory, and migration planning tools.
Harvest Now, Decrypt Later
Definition
An attack strategy where adversaries intercept and store encrypted data today with the intention of decrypting it in the future when sufficiently powerful quantum computers become available.
Usage
Represents the primary near-term threat from quantum computing, particularly for data that must remain confidential for years or decades (state secrets, health records, IP).
How EverTrust helps
EverTrust helps you identify and prioritize the certificates and keys protecting your most sensitive long-lived data, supporting your post-quantum migration roadmap.
ML-DSA (CRYSTALS-Dilithium)
Definition
A lattice-based digital signature scheme selected by NIST as the primary post-quantum standard for digital signatures (FIPS 204), designed to replace RSA and ECDSA signatures.
Usage
Will be used for certificate signing, code signing, document signing, and all applications currently relying on RSA or ECC-based digital signatures.
How EverTrust helps
EverTrust is preparing to support ML-DSA-based certificates, ensuring your PKI can transition to post-quantum signatures when standards are fully deployed.
ML-KEM (CRYSTALS-Kyber)
Definition
A lattice-based key encapsulation mechanism selected by NIST as the primary post-quantum standard for key exchange (FIPS 203), designed to replace Diffie-Hellman and ECDH.
Usage
Will be used in TLS handshakes and other key exchange protocols to establish shared secrets securely, even against quantum adversaries.
How EverTrust helps
EverTrust tracks algorithm usage across your certificate estate, helping you identify systems that will need to migrate to ML-KEM for quantum-safe key exchange.
Shor's Algorithm
Definition
A quantum computing algorithm discovered by Peter Shor in 1994 that can efficiently factor large integers and solve discrete logarithm problems, threatening RSA and ECC cryptography.
Usage
Represents the theoretical basis for why current public-key cryptography (RSA, ECC, DH) will become insecure once large-scale quantum computers are available.
How EverTrust helps
EverTrust's crypto-agility and algorithm tracking capabilities help you prepare for the Shor's algorithm threat by inventorying vulnerable certificates and planning migration.