From the course: Cisco Network Security: Core Security Concepts

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Asymmetric encryption

Asymmetric encryption - Cisco Tutorial

From the course: Cisco Network Security: Core Security Concepts

Start my 1-month free trial

Asymmetric encryption

- [Narrator] Symmetric encryption provides fast, efficient encryption. However it requires both the sender and receiver have the same shared key, which can be a problem in a complex networked environment. Asymmetric encryption is also called public key encryption and it uses two keys that are mathematically related. A public key that you publish and share, and a private key that you keep private. Scientists developed asymmetric encryption in the 1970s as a need for securely exchanging a secret key became evident. Let's step through the process of encrypting data that only Bob should see using asymmetric encryption. We start with Alice sending a secret message to Bob with plain text input. And now, we take Bob's public key and the encrypting algorithm. It then becomes cipher text. It's sent to Bob who uses Bob's private key and the decryption algorithm it then becomes plain text output, and because only Bob has Bob's private key, only Bob can see the contents. Asymmetric or public key…

Contents