Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Random numbers are difficult to produce in computer systems since the numbers are usually generated by an algorithm. Pseudorandom numbers are generated by using random input variables such as keystrokes, voltage, and other varying information, and if they appear to be statistically random, then they are accepted as being random. A common hardware solution using pseudorandom number generation is the Trusted Platform Module chip which securely stores cryptographic keys used by the system.