Asymmetric encryption uses two keys: one to encrypt and the other to decrypt. We can see this in a Public Key Infrastructure, or PKI. In this lesson, we'll take a look at how a PKI works.
This lesson is only available to Linux Academy members.
Sign Up To View This Lesson
© Linux Academy. All rights reserved.
Pinehead® and the Linux Academy logo® is the registered trademark of Linux Academy in the U.S. and other countries.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.