Chapter 15. Asymmetric Encryption and PKI

This chapter covers the following topics:

Asymmetric Encryption

Public Key Confidentiality and Authentication

RSA Functions

Public Key Infrastructure

PKI Terminology

PKI Standards

PKI Topologies

PKI Characteristics

Asymmetric Encryption

Asymmetric algorithms are based on complex mathematical formulas, and therefore computation takes more time than symmetric algorithms.

Examples of public key encryption algorithms are the Rivest, Shamir, and Adleman (RSA) algorithm; Digital Signature Algorithm (DSA); Diffie-Hellman (D-H); ElGamal; and elliptic curve cryptography (ECC).

Public Key Confidentiality and Authentication

Asymmetric algorithms use a public key and a private key. Both keys are capable ...

Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.