Become An Information Security Specialistback
Upon successful completion of this unit, the student will be able to
- compare and contrast symmetric and asymmetric encryption algorithms;
- explain the basic idea behind public-key-based asymmetric algorithms for encryption-based security of information;
- explain the steps in RSA public-key algorithm; and
- explain the steps in Diffie-Hellman public-key algorithm.