//Cyber Security Tools/Asymmetric Encryption

In this lesson we will learn about Asymmetric Encryption (also called Public-Key Encryption). Asymmetric / Public-Key Encryption allows us to establish secure communications even when we have no opportunity to agree on a secret key ahead of time or via another communication channel. This is crucial for secure transactions over the Internet. Additionally, asymmetric/public-key encryption will provide us with a mechanism to digitally "sign" files, which allows us to provide Non-Repudiation.

Limitations of Symmetric (Secret Key) Encryption

Check out the Chicken and Egg problem solution!

Asymmetric Encryption (Public-Key Cryptography)

RSA (Rivest, Shamir & Adleman) Encryption


The Security of RSA

Digital Signatures Intro

Man-in-the-Middle Attack Intro