Chapter 15. Asymmetric Encryption and PKI
This chapter covers the following topics:
• Public Key Confidentiality and Authentication
Asymmetric Encryption
Asymmetric algorithms are based on complex mathematical formulas, and therefore computation takes more time than symmetric algorithms.
Examples of public key encryption algorithms are the Rivest, Shamir, and Adleman (RSA) algorithm; Digital Signature Algorithm (DSA); Diffie-Hellman (D-H); ElGamal; and elliptic curve cryptography (ECC).
Public Key Confidentiality and Authentication
Asymmetric algorithms use a public key and a private key. Both keys are capable ...
Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.