Unit 3 Learning Outcomes

Upon successful completion of this unit, the student will be able to

  • compare and contrast symmetric and asymmetric encryption algorithms;
  • explain the basic idea behind public-key-based asymmetric algorithms for encryption-based security of information;
  • explain the steps in RSA public-key algorithm; and
  • explain the steps in Diffie-Hellman public-key algorithm. 
Last modified: Thursday, July 28, 2016, 10:01 AM