Tag Archives: PKI and Cryptographic Applications

10. Exam Essentials for PKI and Cryptographic Applications

Asymmetric key cryptography is another way of saying public key encryption. Understand the key types used in asymmetric cryptography: public keys are freely shared whereas private keys are kept secret. to encrypt a message, the use the recipient’s public key. … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 10. Exam Essentials for PKI and Cryptographic Applications