Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher. Cite external resources. Explain basic network security concepts.