Download Publication
Who it's for:
- Cybersecurity professionals
- Software developers
- Decision-makers
- IT auditors
- Network security engineers
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Release Date: 11/05/2024
This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establish identity, authenticate entities, maintain data integrity, and control access without requiring any explicit trust. Therefore, it aligns well with the core principles of Zero Trust: Never Trust, Always Verify and Least Privilege.
When considering Zero Trust, asymmetric cryptography is particularly useful for authentication and data protection. For authentication, asymmetric cryptography is integral to Public-Key Infrastructure (PKI), utilizing digital signatures to authenticate users and devices. For data protection, asymmetric cryptography is integral in key exchange to establish the symmetric key for data encryption.
When implementing asymmetric cryptography, it's important to consider factors such as security strength, computational cost, and key size. Additionally, robust key management practices, encompassing generation, distribution, storage, and revocation, are crucial for maintaining cryptographic integrity. Moreover, seamless integration with Identity and Access Management (IAM) systems is essential for efficient authentication and authorization processes.
Readers will come to understand how asymmetric cryptography is a powerful enabler for Zero Trust. Its ability to establish secure communications, verify identities, and ensure data protection, clearly supports Zero Trust objectives.
Key Takeaways:
- The role of asymmetric cryptography in Zero Trust
- The role of key management in cryptography
- Methods for effective key management, including key generation, distribution, storage, rotation, revocation, and hardware security modules (HSMs)
- How to use asymmetric cryptography in various scenarios, including authentication methods like SSH keys, OAuth2.0, and Kerberos
- Computational overheads and risks associated with asymmetric cryptography
- Zero Trust principles relevant to asymmetric cryptography
Download this Resource
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more
Learn more

.jpeg)
.jpeg)
.jpeg)
.jpeg)