Please enable JavaScript to use CodeHS

Advanced Cybersecurity

Lesson 1.6 Asymmetric Encryption

Description

In this lesson, students learn how asymmetric encryption uses public and private keys to encrypt data and they learn how the RSA algorithm addresses the security issue of key authentication. Students also explore different examples of asymmetric encryption algorithms and evaluate them to determine what aspects make an algorithm strong.


Objective

Students will be able to:

  • Explain how asymmetric encryption uses a public and private key to encrypt data
  • Explain how the RSA algorithm addresses security vulnerabilities
  • Evaluate asymmetric encryption algorithms to determine what characteristics make an algorithm strong