Cryptography, Hashes, Signatures, PKI, and Certificate Decision Rules

Key Takeaways

  • Encryption provides confidentiality; hashing provides integrity; digital signatures provide integrity, signer authentication, and non-repudiation support.
  • Symmetric encryption is fast for bulk data, while asymmetric cryptography supports key exchange, signatures, and public key trust.
  • PKI binds public keys to identities through certificates, certificate authorities, and trust chains.
  • Certificate problems often involve expiration, name mismatch, untrusted issuer, revocation, or missing private key protection.
  • Password hashing should use salts and slow password hashing algorithms rather than reversible encryption.
Last updated: April 2026

Cryptography, Hashes, Signatures, PKI, and Certificates

Start with the security goal. If the goal is secrecy, think encryption. If the goal is detecting modification, think hashing or signatures. If the goal is binding a public key to a name, think certificates and PKI.

MechanismPrimary purposeKey exam phrase
Symmetric encryptionConfidentiality with one shared secret keyFast bulk encryption
Asymmetric encryptionPublic/private key operationsKey exchange, encrypt to public key
HashingIntegrity check with one-way digestSame input should produce same digest
Salted password hashPassword storage defenseSame passwords should not have same stored hash
Digital signatureIntegrity plus signer authenticationSign with private key, verify with public key
CertificateBinds public key to identityIssued by CA, subject name, validity period

Decision Rules

RequirementBest answer direction
Encrypt a large database backup efficientlySymmetric encryption
Safely establish a session key with a remote websiteAsymmetric key exchange leading to symmetric session encryption
Verify a downloaded file did not changeHash comparison
Prove a code package came from the developer and was not modifiedDigital signature
Bind a web server public key to a domain nameCertificate
Store passwords securelySalted, slow password hashing
Destroy recoverability of encrypted data quicklyDestroy the encryption key

PKI Pieces

ComponentRole
Certificate authorityIssues and signs certificates
Registration authorityValidates identity before certificate issuance in some PKI designs
CertificateContains subject, public key, issuer, validity, and extensions
Private keyMust be protected; compromise breaks trust for that certificate
CRL or OCSPSupports revocation checking
Root CATrust anchor that must be protected carefully
Intermediate CAIssues certificates without exposing the root CA directly

Certificate Failure Clues

Browser or service clueLikely issue
Certificate expired yesterdayValidity period problem
Certificate is for app.example.com but user visits payroll.example.comName mismatch
Issuer is not trustedMissing or untrusted CA chain
Private key was exposedRevoke and replace certificate
Certificate was revokedDo not trust even if dates look valid
Self-signed certificate on public siteTrust warning unless explicitly trusted

Trap Callout: Hashing Is Not Encryption

A hash is one-way. You do not decrypt a hash to recover the original file or password. Password systems compare a new hash of the submitted password with the stored salted hash. If the scenario requires recovery of original data, hashing is the wrong answer.

Scenario Walkthrough

A software team publishes an installer and wants customers to know the installer has not been altered and came from the team. A plain hash can detect accidental or malicious modification, but anyone could publish a new hash next to a tampered file. A digital signature is stronger because the team signs the package with its private key and customers verify with the corresponding public key through a trusted certificate.

Quick Drill

ScenarioBest concept
Need fast encryption for a disk volumeSymmetric encryption
Need to verify who signed a documentDigital signature
Need to prove a web public key belongs to a domainCertificate
Need to detect file tamperingHash
Need to check whether a certificate should no longer be trustedRevocation
Test Your Knowledge

A team needs customers to verify that a software update came from the publisher and was not modified. Which control best meets both goals?

A
B
C
D
Test Your Knowledge

A browser warns that a certificate is valid for files.example.com, but the user visited pay.example.com. What is the most likely problem?

A
B
C
D
Test Your KnowledgeMulti-Select

Which cryptographic mechanisms primarily support integrity? Choose two.

Select all that apply

Hashing
Digital signatures
Plaintext storage
Open guest Wi-Fi