Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Cryptography is used to provide confidentiality and integrity, two of the tenets of the CIA triad. It employs encryption to make data unreadable by transforming it into ciphertext. In addition, cryptography is used to provide assurance of a message's author, source authentication, and delivery proof. This lesson discusses cryptography techniques and implementations used to secure data in the enterprise.




Source: Dominique Hubbard, https://www.edjet.com/scorm-content/edjet-prod-uploads/1bbb6bd2940fd96497953e96a7011e315c141cf3/771aacefbe2ed9e16b17173a36b691df/story_content/WebObjects/6MLNkf2prXH/lesson03/index.html
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.