Register now or log in to join your professional community.
Keys are used to open doors, cars, wardrobes, and other accessible stuff. Keys are also used in information security to deal with confidentiality, integrity, and authentication issues.
Asymmetric Keys are used in PKI infrastructure, It has2 key, Public key and Private key. The message encrypted with Public will only be decrypted by private key. Public keys are shared, Where are private keys are kept secret ( they are not shared ). HTTPS is an example for application used.