Skip to content

Understanding Modern Cryptographic Keys: A Practical Guide for Learners

Published:
β€’ 5 min read

If you’re learning about SSH keys, X.509 certificates, RSA, Ed25519, ECDSA, TLS, and HTTPS, it can feel overwhelming at first. The good news? All of modern security follows a clear structure. Once you see the layers, everything starts making sense.

This guide will walk you through the complete hierarchy of keys used today, how they’re used in real IT systems, and how everything connects in real-world environments.

πŸ” The Foundation: Two Types of Cryptography

All modern cryptography used in IT falls into two categories:

Cryptography
β”‚
β”œβ”€β”€ 1) Asymmetric (Public / Private Key Pair)
└── 2) Symmetric (Single Shared Secret Key)

Understanding this split is the key to everything.

Asymmetric Cryptography (Identity & Trust)

Asymmetric cryptography uses a key pair: a public key that you share and a private key that you keep secret.

It’s mainly used for:

Modern Algorithms Used Today

RSA (2048-bit or higher)
ECDSA (P-256, P-384)
Ed25519
X25519 (key exchange)

These are actively used in SSH, HTTPS, VPN, code signing, and secure email. For example, they’re used inside Transport Layer Security (TLS) to establish secure connections.

Symmetric Cryptography (Data Protection)

Symmetric cryptography uses one shared key for both encryption and decryption.

It’s used for:

Modern Symmetric Algorithms

AES-128-GCM
AES-256-GCM
ChaCha20-Poly1305

Here’s the important concept: Asymmetric cryptography establishes trust, while symmetric cryptography encrypts the actual data.

Real IT Example: How HTTPS Works (TLS)

When you open a website using HTTPS, here’s what happens behind the scenes:

Step 1 - Server Sends Certificate

The server sends an X.509 certificate. It contains:

Step 2 - Certificate Chain of Trust

Root CA
   ↓
Intermediate CA
   ↓
Server Certificate

Your browser trusts the Root CA. That trust flows down to the website certificate.

Step 3 - Secure Key Exchange

Modern TLS typically uses X25519 or ECDHE (Elliptic Curve Diffie-Hellman). This creates a temporary symmetric session key.

Step 4 - Encrypted Communication

After the handshake, the session key uses AES-GCM or ChaCha20 to encrypt all traffic. That’s how secure web browsing works.

Real IT Example: SSH Login

When connecting to a Linux server, you typically run:

ssh-keygen -t ed25519

This creates a private key (kept locally) and a public key (added to the server).

Modern SSH keys used today:

Unlike TLS, SSH doesn’t require a certificate authority. Trust is configured manually by adding your public key to the server’s authorized_keys file.

Real IT Example: Cloud & DevOps

In modern infrastructure, cryptography is everywhere:

Kubernetes uses X.509 certificates for authentication between components.

Microservices (mTLS) means each service has its own certificate and uses mutual TLS authentication.

Code Signing ensures applications are signed with certificate-based keys.

VPN Access typically uses certificate-based authentication.

Complete Modern Key Hierarchy (2026)

Modern IT Cryptography
β”‚
β”œβ”€β”€ Asymmetric Layer (Identity + Trust)
β”‚   β”‚
β”‚   β”œβ”€β”€ Algorithms
β”‚   β”‚   β”œβ”€β”€ RSA
β”‚   β”‚   β”œβ”€β”€ ECDSA
β”‚   β”‚   β”œβ”€β”€ Ed25519
β”‚   β”‚   └── X25519
β”‚   β”‚
β”‚   β”œβ”€β”€ Systems
β”‚   β”‚   β”œβ”€β”€ SSH
β”‚   β”‚   └── X.509 Certificate System
β”‚   β”‚        β”œβ”€β”€ Root CA
β”‚   β”‚        β”œβ”€β”€ Intermediate CA
β”‚   β”‚        └── End-Entity Certificate
β”‚   β”‚
β”‚   └── Purpose
β”‚       β”œβ”€β”€ Authentication
β”‚       β”œβ”€β”€ Digital Signatures
β”‚       └── Key Exchange
β”‚
└── Symmetric Layer (Data Encryption)
    β”‚
    β”œβ”€β”€ AES-GCM
    └── ChaCha20-Poly1305

A Simple Mental Model for Learners

Whenever you encounter security in IT, ask yourself:

  1. Is this asymmetric or symmetric?
  2. Is it used for identity or data encryption?
  3. Is there a certificate authority involved?
  4. Where does trust come from?

Answering these questions helps you understand any secure system.

If you’re learning this step by step, here’s what I recommend:

Step 1: Understand public vs private keys, and symmetric vs asymmetric encryption.

Step 2: Study one full TLS handshake from start to finish. Really dig into what happens.

Step 3: Compare the SSH trust model with the X.509 trust model. Notice the differences.

Step 4: Practice hands-on. Generate an SSH key, create a self-signed certificate, and inspect HTTPS certificates in your browser. Hands-on learning makes everything clear.

Final Takeaway

Modern cryptography is layered:

Identity β†’ Trust β†’ Key Exchange β†’ Symmetric Encryption

Once you understand the layers, you can confidently work with SSH, HTTPS, cloud infrastructure, and secure DevOps systems. Security becomes structured, not mysterious.

The key is to take it step by step. Start with the basics, build your understanding gradually, and practice with real tools. Before you know it, concepts that seemed complicated will become second nature.

New posts, shipping stories, and nerdy links straight to your inbox.

2Γ— per month, pure signal, zero fluff.


Edit on GitHub