Sai Keerthan Kasulakeerthankasula.hashnode.dev·May 5, 2024Part 3 : The public key infrastructure and certificate managementWith respect to my previous articles, I explained how encryption and decryption are performed, including the elements used for the hybrid encryption. As we know, we use two keys for asymmetric encryption: a public key and a private key. The term "pub...1 like·36 readsCertificate Exchange