From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Asymmetric algorithms

Asymmetric algorithms

- In this section of the course, we're going to continue our coverage of cryptography by discussing asymmetric algorithms. Now again, we're going to be in domain three, Security, Engineering, and Cryptography, specifically objective 3.6. Now, objective 3.6 states that given a business requirement, you must implement the appropriate cryptographic protocols and algorithms. As we start out this section, we're going to begin by covering the concept of an asymmetric encryption algorithm and how it works. Then we're going to discuss one of the most common uses of asymmetric algorithms in more depth, which is the secure socket layer, or SSL and TLS, or transport layer security protocols that are used inside of HTTPS or Hypertext Transfer Protocol Secure. Next, we'll talk about S/MIME and SSH, which are two more common use cases for asymmetric encryption algorithms to secure email and remote access over the internet. Then we're going to discuss EAP, the Extensible Authentication Protocol…

Contents