Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Watermarking is used to identify ownership of copyrighted material. If the original material gets copied, a watermark flags the data's ownership without degrading it in any way. Watermarking is a passive protection tool.