PKI
https://en.wikipedia.org/wiki/Public_key_infrastructure
A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed
to create, manage, distribute, use, store and revoke digital certificates and manage public-key
encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a
range of network activities such as e-commerce, internet banking and confidential email. It is
required for activities where simple passwords are an inadequate authentication method and more
rigorous proof is required to confirm the identity of the parties involved in the communication and to
validate the information being transferred.
Incorrect answers:
PIKE - stream cipher was invented by Ross Anderson to be a "leaner and meaner" version of FISH
after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish.
GOST - hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit
cryptographic hash function. It was initially defined in the Russian national standard GOST R 34.11-94
Information Technology – Cryptographic Information Security – Hash Function. The equivalent
standard used by other member-states of the CIS is GOST 34.311-95.
CA - certificate authority or certification authority (CA) is an entity that issues digital certificates. A
digital certificate certifies the ownership of a public key by the named subject of the certificate. This
allows others (relying parties) to rely upon signatures or on assertions made about the private key
that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the
subject (owner) of the certificate and by the party relying upon the certificate. The format of these
certificates is specified by the X.509 or EMV standard.