Part 3: Asymmetric Cryptography and Certificates
In this part, we will learn about asymmetric cryptography, public and private encryption keys, digital signatures and their verification, and X.509 certificates. This part will compare asymmetric ciphers, such as RSA and Elliptic Curves. All the technologies mentioned will be illustrated using command-line and C code examples.
This part the following chapters:
- Chapter 6, Asymmetric Encryption and Decryption
- Chapter 7, Digital Signatures and Their Verification
- Chapter 8, X.509 Certificates and PKI