Online Certificate Status Protocol
/ˌoʊ.siːˈɛs.piː/
noun — "the real-time check that keeps digital certificates honest."
OCSP, short for Online Certificate Status Protocol, is a network protocol used to obtain the real-time revocation status of a digital certificate within a PKI framework. Unlike CRLs, which are periodically published lists, OCSP allows clients to query a Certificate Authority (CA) directly to verify whether a certificate is valid, revoked, or unknown.
Certificate Revocation List
/ˌsiː.ɑːrˈɛl/
noun — "the blacklist that keeps revoked certificates in check."
CRL, short for Certificate Revocation List, is a digitally signed list of certificates that have been revoked before their scheduled expiration within a PKI system. It enables systems and applications to verify that a digital certificate is no longer trustworthy due to compromise, expiration, or policy violations, ensuring secure communications remain intact.
Digital Signature
/ˈdɪdʒ.ɪ.təl ˈsɪɡ.nə.tʃər/
noun — "a cryptographic stamp that proves data authenticity."
Certificate Authority
/ˈsɜːr.tɪ.fɪ.kət əˈθɒr.ɪ.ti/
noun — "the trusted entity that vouches for digital identities."
Public Key Infrastructure
/ˌpiːˌkeɪˈaɪ/
noun — "the system that makes digital trust possible."
PKI, short for Public Key Infrastructure, is a framework that manages digital certificates and public-private key pairs to enable secure communication, authentication, and data integrity over networks such as the Internet. It provides the foundation for encryption, digital signatures, and identity verification in applications ranging from secure email to e-commerce and VPNs.
Hash function
/hæʃ ˈfʌŋk.ʃən/
noun — "a function that converts data into a fixed-size digital fingerprint."
Hash Function is a mathematical algorithm that transforms input data of arbitrary length into a fixed-size value, called a hash or digest. This process is deterministic, meaning the same input always produces the same hash, but even a tiny change in input drastically changes the output. Hash Functions are widely used in data integrity verification, cryptography, digital signatures, password storage, and blockchain technologies.
Cryptography
/ˈkrɪp.təˌɡræ.fi/
noun — "the art and science of keeping information secret and verifiable."
Cryptography is the study and practice of techniques for securing communication and data from unauthorized access, manipulation, or interception. It involves transforming readable data (plaintext) into an encoded form (ciphertext) using mathematical algorithms and keys, ensuring confidentiality, integrity, authentication, and non-repudiation. Cryptography underpins secure digital communication, online banking, blockchain systems, and password protection.
Spoofing
/ˈspuːfɪŋ/
noun — "tricking systems or users into believing false data is real."
Spoofing refers to the act of falsifying or impersonating data, signals, or identities to deceive a target system or user. In computing and telecommunications, spoofing can occur in multiple forms, including IP address spoofing, GPS spoofing, email spoofing, and caller ID spoofing. The objective is often to bypass security measures, redirect traffic, gather sensitive information, or manipulate a system’s behavior.
Open Service Navigation Message Authentication
/ˌoʊ ɛs ɛn ɛm eɪ/
noun — "verifying satellite navigation signals to trust your position."
SSH
/ˌɛs ɛs ˈeɪtʃ/
noun … “a secure protocol for remote command execution and communication over untrusted networks.”