Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Cryptography is the enciphering and deciphering of data using various algorithms, and it is a tool that is used to increase the security of a system. The concept of cryptography has been around for a long time and has continued to evolve over thousands of years. One of the first forms of cryptography was used by Julius Creaser, and it is commonly known as the Creaser cipher which was a simple substitution cipher. Modern day cryptography, however, requires much more complicated algorithms in order to serve the purpose of data integrity.

Watch the video, Encryption Part I: Introduction to Encryption 1 (12:15), for an explanation on what encryption is and how it works.