Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 4:  Basics of Cryptography (Domain 4.0; 15%)
      9  4.1  Algorithms

Previous Topic/Section
Security Issues with Symmetric Cryptography
Previous Page
Pages in Current Topic/Section
1
Next Page
Asymmetric Cryptography Algorithms
Next Topic/Section

4.1.3  Asymmetric

Asymmetric algorithms use a pair of keys -- one key to encrypt data and a different key to decrypt the data. This type of cryptographic system is known as a public/private key system, because it involves the use of a public key that is distributed to others, and a private key whose confidentiality is guarded carefully by the owner of the key pair. Typically at least one public/private key pair is issued to each user, and a user will have access to only one private key (their own), and potentially many dozens, hundreds or even thousands of public keys (belonging to others, which they use when communicating with those other users).

An asymmetric algorithm makes use of what cryptographers call a “trapdoor one-way function”. That is, like a hash, the function that computes the encrypted output is not reversible using the same key. Unlike a hash, there is another key which, when applied to the data, will decrypt it. So, unlike with hashing, it is possible to recover the original document’s contents.

Asymmetric Uses...

Asymmetric algorithms use a pair of keys – one key to encrypt the data, and another to decrypt it.

This is known as public/private key encryption, or sometimes just public key encryption, because it involves a public key that is distributed to others and a private key known only to the owner of the key pair.


Quick navigation to subsections and regular topics in this section



Previous Topic/Section
Security Issues with Symmetric Cryptography
Previous Page
Pages in Current Topic/Section
1
Next Page
Asymmetric Cryptography Algorithms
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.