lab3 - Lab 3 Public Key Infrastructure(PKI Asymmetric...

Info icon This preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Lab 3: Public Key Infrastructure Lab 3: Public Key Infrastructure (PKI) Asymmetric cryptography VS symmetric h cryptography Digital Signature • Certificate • Certification Authority (CA) Certification Authority (CA) Secure Sockets Layer (SSL) protocol IEG 7006 (2010) 1
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Lab 3: PKI Asymmetric cryptography vs symmetric cr ptograph cryptography Symmetric cryptography traditional form of cryptography a single key is used for both encryption and decryption the sender and receiver share a key A t i t h ( bli k t h ) Asymmetric cryptography (public key cryptography) uses two mathematically related keys a message encrypted by one key can only be decrypted by the other key receive secure messages by simply publishing one key (the public key) and keeping the other secret (the private key) IEG 7006 (2010) 2
Image of page 2