Chapter 14. Exploring PKI and Asymmetric Encryption

<feature><title></title>

This chapter covers the following subjects:

  • Understanding asymmetric algorithms: This section explores asymmetric encryption and looks at how this is used in a Public Key Infrastructure (PKI). It also examines the features and capabilities of RSA, as well as its history. This section concludes by delving into the Diffie-Hellman algorithm and how it is used for key exchange.

  • Working with a PKI: This section examines the principles behind a PKI and discusses the attempts at standardization in this area. It also covers the role of certificate authorities (CA) in support of the PKI and examines the various topologies in which they may be used.

</feature>

Asymmetric encryption ...

Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.