Please enable JavaScript to use CodeHS

AP Computer Science Principles: Cybersecurity

Lesson 10.4 Asymmetric Encryption

Description

In this lesson, students will explore the concepts of key exchange and encryption, unlocking the secrets of how messages are protected online.


Objective

Students will be able to:

  • Identify the weaknesses with symmetric key encryption and why modern cryptography involves more complex mathematics
  • Explain the difference between symmetric and asymmetric encryption
  • Describe the key exchange process using the Diffie-Hellman algorithm (basic understanding).
  • Explain how public-key cryptography is used for encryption and decryption.