This chapter discussed symmetric and asymmetric encryption algorithms and how they are used with a public key infrastructure. You read about the risks associated with maintaining key management and certificate authorities in-house and outsourcing them. You reviewed the security services that are provided through the various PKI functions and how each of them functions individually. Understanding these concepts will assist you in understanding why this technology is needed and how its use has expanded over time.