If youβre learning about SSH keys, X.509 certificates, RSA, Ed25519, ECDSA, TLS, and HTTPS, it can feel overwhelming at first. The good news? All of modern security follows a clear structure. Once you see the layers, everything starts making sense.
This guide will walk you through the complete hierarchy of keys used today, how theyβre used in real IT systems, and how everything connects in real-world environments.
π The Foundation: Two Types of Cryptography
All modern cryptography used in IT falls into two categories:
Cryptography
β
βββ 1) Asymmetric (Public / Private Key Pair)
βββ 2) Symmetric (Single Shared Secret Key)
Understanding this split is the key to everything.
Asymmetric Cryptography (Identity & Trust)
Asymmetric cryptography uses a key pair: a public key that you share and a private key that you keep secret.
Itβs mainly used for:
- Authentication
- Digital signatures
- Secure key exchange
Modern Algorithms Used Today
RSA (2048-bit or higher)
ECDSA (P-256, P-384)
Ed25519
X25519 (key exchange)
These are actively used in SSH, HTTPS, VPN, code signing, and secure email. For example, theyβre used inside Transport Layer Security (TLS) to establish secure connections.
Symmetric Cryptography (Data Protection)
Symmetric cryptography uses one shared key for both encryption and decryption.
Itβs used for:
- Encrypting data
- Protecting communication traffic
- Fast encryption at scale
Modern Symmetric Algorithms
AES-128-GCM
AES-256-GCM
ChaCha20-Poly1305
Hereβs the important concept: Asymmetric cryptography establishes trust, while symmetric cryptography encrypts the actual data.
Real IT Example: How HTTPS Works (TLS)
When you open a website using HTTPS, hereβs what happens behind the scenes:
Step 1 - Server Sends Certificate
The server sends an X.509 certificate. It contains:
- Public key
- Domain identity
- Issuer (Certificate Authority)
- Validity period
- Digital signature
Step 2 - Certificate Chain of Trust
Root CA
β
Intermediate CA
β
Server Certificate
Your browser trusts the Root CA. That trust flows down to the website certificate.
Step 3 - Secure Key Exchange
Modern TLS typically uses X25519 or ECDHE (Elliptic Curve Diffie-Hellman). This creates a temporary symmetric session key.
Step 4 - Encrypted Communication
After the handshake, the session key uses AES-GCM or ChaCha20 to encrypt all traffic. Thatβs how secure web browsing works.
Real IT Example: SSH Login
When connecting to a Linux server, you typically run:
ssh-keygen -t ed25519
This creates a private key (kept locally) and a public key (added to the server).
Modern SSH keys used today:
ssh-ed25519(recommended)- RSA (SHA-2 variants)
Unlike TLS, SSH doesnβt require a certificate authority. Trust is configured manually by adding your public key to the serverβs authorized_keys file.
Real IT Example: Cloud & DevOps
In modern infrastructure, cryptography is everywhere:
Kubernetes uses X.509 certificates for authentication between components.
Microservices (mTLS) means each service has its own certificate and uses mutual TLS authentication.
Code Signing ensures applications are signed with certificate-based keys.
VPN Access typically uses certificate-based authentication.
Complete Modern Key Hierarchy (2026)
Modern IT Cryptography
β
βββ Asymmetric Layer (Identity + Trust)
β β
β βββ Algorithms
β β βββ RSA
β β βββ ECDSA
β β βββ Ed25519
β β βββ X25519
β β
β βββ Systems
β β βββ SSH
β β βββ X.509 Certificate System
β β βββ Root CA
β β βββ Intermediate CA
β β βββ End-Entity Certificate
β β
β βββ Purpose
β βββ Authentication
β βββ Digital Signatures
β βββ Key Exchange
β
βββ Symmetric Layer (Data Encryption)
β
βββ AES-GCM
βββ ChaCha20-Poly1305
A Simple Mental Model for Learners
Whenever you encounter security in IT, ask yourself:
- Is this asymmetric or symmetric?
- Is it used for identity or data encryption?
- Is there a certificate authority involved?
- Where does trust come from?
Answering these questions helps you understand any secure system.
Recommended Learning Flow
If youβre learning this step by step, hereβs what I recommend:
Step 1: Understand public vs private keys, and symmetric vs asymmetric encryption.
Step 2: Study one full TLS handshake from start to finish. Really dig into what happens.
Step 3: Compare the SSH trust model with the X.509 trust model. Notice the differences.
Step 4: Practice hands-on. Generate an SSH key, create a self-signed certificate, and inspect HTTPS certificates in your browser. Hands-on learning makes everything clear.
Final Takeaway
Modern cryptography is layered:
Identity β Trust β Key Exchange β Symmetric Encryption
Once you understand the layers, you can confidently work with SSH, HTTPS, cloud infrastructure, and secure DevOps systems. Security becomes structured, not mysterious.
The key is to take it step by step. Start with the basics, build your understanding gradually, and practice with real tools. Before you know it, concepts that seemed complicated will become second nature.