Exploring Asymmetric Encryption

Asymmetric encryption (also known as public key cryptography) uses two matched keys known as public and private keys. There are a few important points to understand related to these keys:

• Anything encrypted with the public key can be decrypted only with the matching private key.

• Anything encrypted with the private key can be decrypted only with the matching public key.

• The private key is always kept private and never shared.

• The public key is freely shared and publicly available.

Asymmetric encryption requires a public key infrastructure (PKI, described in more detail later in this chapter) to create, manage, distribute, validate, and revoke certificates. A public key is embedded in a freely shared certificate. ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.