The most common asymmetric algorithms include the DH algorithm, which creates a secure session so that symmetric data can flow securely. An example of this would be the L2TP/IPsec VPN. RSA is the most commonly used asymmetric algorithm, and was the very first of its kind, creating public and private key pairs. ECC is an asymmetric algorithm used for the encryption of small mobile devices.
Comparing and Contrasting the Basic Concepts of Cryptography
Asymmetric – PKI
Asymmetric keys are obtained from a CA. If you are selling products or services with external entities, then you need to obtain your X509s from a public CA, otherwise your internal certificates will not be accepted.