From the course: Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 23,300 courses taught by industry experts.

Asymmetric cryptography

Asymmetric cryptography

- [Instructor] After talking about symmetric cryptography, the next logical step is to talk about asymmetric cryptography. So if we look at those words, symmetric meaning same, the same key is used to encrypt as to decrypt. But now we're on asymmetric cryptography. So now we're talking about not the same. So we have to talk about the heart and soul of asymmetric cryptography. And that's the relationship between the key. So first of all, every user in an asymmetric environment's going to get two keys, public key, and a private key. Now that right there solves the scalability problem because every user's going to have two keys, no matter how many other people are in that environment. So that's a benefit, and that solves one of the problems that symmetric cryptography left us with. Now the thing about these keys, a public key and a private key. These two are mathematically related in such a way that anything encrypted with one key can only be decrypted by the other. So anything encrypted…

Contents