Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Code signing is used by software manufacturers as a way to ensure that the code is legitimate. This means then when the OS is updated on a computer, the digital signature of the update is checked to ensure that the update is from the manufacturer. Another popular example of code signing is the downloading of iPhone apps from the App store.