Video Description

This lesson covers asymmetric cryptography. In this form of cryptography, every user receives two keys (eg., 1,000 users, so 2,000 keys). One is public and one is private and they are mathematically related so anything encrypted with one key can be decrypted by the other.

Course Modules

ISC2 CISSP