Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers asymmetric cryptography. In this form of cryptography, every user receives two keys (eg., 1,000 users, so 2,000 keys). One is public and one is private and they are mathematically related so anything encrypted with one key can be decrypted by the other.