1-2z Encryption/decryption: The information encrypted with a receiver's public key can be decrypted bythe receiver possessing the corresponding private key. This is used to ensure confidentiality.z Digital signature: The information encrypted with a sender's private key can be decrypted byanyone who has access to the sender's public key, thereby proving that the information is from thesender and has not been tampered with. For example, user 1 adds a signature to the data using theprivate key, and then sends the data to user 2. User 2 verifies the signature using the public key ofuser 1. If the signature is correct, the data is considered from user 1.Revest-Shamir-Adleman Algorithm (RSA), and Digital Signature Algorithm (DSA) are all asymmetrickey algorithms. RSA can be used for data encryption/decryption and signature, whereas DSA are usedfor signature only.Asymmetric key algorithms are usually used in digital signature applications for peer identityauthentication because they involve complex calculations and are time-consuming; symmetric keyalgorithms are often used to encrypt/decrypt data for security.Configuring the Local Asymmetric Key PairYou can create and destroy a local asymmetric key pair, and export the host public key of a localasymmetric key pair.Creating an Asymmetric Key PairFollow these steps to create an asymmetric key pair:To do… Use the command… RemarksEnter system view system-view —Create a local DSA , or RSAkey pairspublic-key local create { dsa |rsa }RequiredBy default, there is no such key pair.