Unit 3 Learning Outcomes
Upon successful completion of this unit, the student will be able to
- compare and contrast symmetric and asymmetric encryption algorithms;
- explain the basic idea behind public-key-based asymmetric algorithms for encryption-based security of information;
- explain the steps in RSA public-key algorithm; and
- explain the steps in Diffie-Hellman public-key algorithm.
Last modified: Thursday, July 28, 2016, 10:01 AM