From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Asymmetric cryptography
From the course: Ethical Hacking: Cryptography
Asymmetric cryptography
- [Instructor] It's now time to talk about asymmetric cryptography. At a high level it uses two separate keys called a key pair, one to encrypt and the other to decrypt. There are a few key concepts you'll need to know. Every user has a key pair. Key pairs are mathematically related, which means you encrypt with your public key and decrypt with your private key. You can freely distribute public keys, however, you must never give your private key to anyone. Asymmetric cryptography also goes by the alias of public key encryption, which is especially important as you study to take your exam. As wonderful, as you'll soon discover, that asymmetric cryptography is, you'll also expose its greatest weakness of being computationally slow. I'll provide an example, explain its strengths and weaknesses, and highlight algorithms associated with it without going into all the gory details, asymmetric cryptography relies on a mathematical recipe known as trapdoor functions, which uses very large…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.