Become An Information Security Specialist

back
Public-Key Encryption

Learning Outcomes

Upon successful completion of this unit, the student will be able to

  • compare and contrast symmetric and asymmetric encryption algorithms;
  • explain the basic idea behind public-key-based asymmetric algorithms for encryption-based security of information;
  • explain the steps in RSA public-key algorithm; and
  • explain the steps in Diffie-Hellman public-key algorithm.

Share with: