Part 3: Asymmetric Cryptography and Certificates

In this part, we will learn about asymmetric cryptography, public and private encryption keys, digital signatures and their verification, and X.509 certificates. This part will compare asymmetric ciphers, such as RSA and Elliptic Curves. All the technologies mentioned will be illustrated using command-line and C code examples.

This part the following chapters:

  • Chapter 6, Asymmetric Encryption and Decryption
  • Chapter 7, Digital Signatures and Their Verification
  • Chapter 8, X.509 Certificates and PKI
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset