O'Reilly logo

CCNA Security (640-554) Portable Command Guide by Bob Vachon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Asymmetric Encryption and PKI

This chapter covers the following topics:

Asymmetric Encryption

Public Key Confidentiality and Authentication

RSA Functions

Public Key Infrastructure

PKI Terminology

PKI Standards

PKI Topologies

PKI Characteristics

Asymmetric Encryption

Asymmetric algorithms are based on complex mathematical formulas, and therefore computation takes more time than symmetric algorithms.

Examples of public key encryption algorithms are the Rivest, Shamir, and Adleman (RSA) algorithm; Digital Signature Algorithm (DSA); Diffie-Hellman (D-H); ElGamal; and elliptic curve cryptography (ECC).

Public Key Confidentiality and Authentication

Asymmetric algorithms use a public key and a private key. Both keys are capable ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required