Exploring Asymmetric Encryption

Asymmetric encryption (also known as public key cryptography) uses two matched keys known as public and private keys. There are a few important points to understand related to these keys:

• Anything encrypted with the public key can be decrypted only with the matching private key.

• Anything encrypted with the private key can be decrypted only with the matching public key.

• The private key is always kept private and never shared.

• The public key is freely shared and publicly available.

Asymmetric encryption requires a public key infrastructure (PKI, described in more detail later in this chapter) to create, manage, distribute, validate, and revoke certificates. A public key is embedded in a freely shared certificate. ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.