Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Watch the video, Encryption Part I: Introduction to Encryption 3 (8:23), which discusses the implementation of various forms of secure encryption.