Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Publishers, copyright holders, and hardware manufacturers use digital rights management (DRM) to control the use of digital content. Read the article, How Digital Rights Management Works.