Unit 3: Public-Key Encryption
In this unit, we explore basic cryptography concepts and look into the details of asymmetric key encryption techniques based on the concepts of a public-key. You will be able to compare and contrast public-key algorithms and symmetric algorithms discussed in Unit 2. In particular, we will discuss the public-key algorithms by Rivest, Shamir, and Adelman (RSA) and another algorithm by Diffie and Hellman.
Completing this unit should take you approximately 12 hours.
3.1: Introduction to Public-Key Cryptography
3.2: Public-Key Encryption Algorithms
3.3: Public-Key Cryptography
3.4: RSA Public-Key Algorithm
3.5: Diffie-Hellman Algorithm
3.6: Cryptography in Practice