View Resource
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Release Date: 11/05/2024
Organization: CSA
Content Type: Guidance
Solution Provider Neutrality: Neutral
This paper investigates the convergence of asymmetric cryptography and Zero Trust Architecture (ZTA), exploring the utilization of asymmetric encryption to fulfill the core objectives of Zero Trust (ZT) security. The ZT security strategy is designed to combat contemporary cyber threats by assuming no implicit trust. Asymmetric cryptography, known for contributing to secure communications, authenticating users, and verifying data authenticity, supports realizing ZT principles. Exploring applications of asymmetric cryptography in ZT scenarios focuses on authentication and data protection. For authentication, asymmetric cryptography is integral to Public-Key Infrastructure (PKI), utilizing digital signatures to authenticate users and devices. For data protection, especially for data in transit, asymmetric cryptography is integral in key exchange to establish the symmetric key for data encryption.