NCAE Mapping Hub
Security+ ยท 3.0 Security Architecture

Asymmetric encryption

Encryption where a public key encrypts and a private key decrypts (or the reverse for signatures). Slower than symmetric but solves key-distribution. Examples: RSA, ECDSA, Ed25519.

How this shows up at NCAE

SSH key-based auth (`authorized_keys`) is asymmetric. The scoring engine has the private key, your server has the public key. Your server NEVER sees the private key.

Error patterns associated with this term

Competition failures where this Security+ concept applies.

Pts missed Count Service Status Message Teams