Blog Stats
- 75,561 hits
Daily Archives: July 2, 2013
10. Exam Essentials for PKI and Cryptographic Applications
Asymmetric key cryptography is another way of saying public key encryption. Understand the key types used in asymmetric cryptography: public keys are freely shared whereas private keys are kept secret. to encrypt a message, the use the recipient’s public key. … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, PKI and Cryptographic Applications
Comments Off on 10. Exam Essentials for PKI and Cryptographic Applications