Unit 5 – Lesson 3 – “Asymmetric Cryptography”
11 Days
Shifting from symmetric to asymmetric cryptography, this lesson takes students on a deeper dive beginning with the concept of public key cryptography to round out the use of cryptography as a mechanism to maintain confidentiality. The lesson shifts to the connection that cryptography has to ensure integrity through the study of hash functions, before making a final shift to the study of digital signatures.