Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

This lesson discussed symmetric and asymmetric encryption systems. Symmetric systems are faster due to the fact that there is only one key being used. Asymmetric encryption is more secure but the use of both a private key and a public key make key management more difficult. The SSL protocol makes use of both symmetric and asymmetric encryption. This lesson also discussed the primary components of public key infrastructure (PKI).