Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This section explores in detail Asymmetric Cryptography and what happens at each stage of encryption/decryption and why a hash is neither symmetric nor asymmetric. We explain how Asymmetric Cryptography actually delivers all 4 encryption services: privacy, authenticity, integrity, non-repudiation (PAIN). Then we explain what happens at each state of asymmetric cryptography, what info is required I the exchanged between public and private key, how packet verification occurs, and how a hash is created and hashing algorithms used, and what comprises a digital signature.