Cryptography

Share & Bookmark, Press Enter to show all options, press Tab go to next option
Print

This interactive lesson describes how modern cryptography utilizes algorithms that use keys to encrypt and decrypt information. It explains the difference between symmetric cryptography and asymmetric cryptography. Examples of cryptography in real-life include apps for mobile messaging that use end-to-end encryption to maintain the confidentiality of messages, and digital signatures that provide proof of authentication and non-repudiation. A self-assessment is provided at the end of the lesson.


National Science Foundation LogoThis interactive lesson was made possible by funding from National Science Foundation Grant # DUE 1601612 at Brookdale Community College in Lincroft, New Jersey – PI Mike Qaissaunee, with contributions from Dr. John Sands & Susan Sands of Moraine Valley Community College and Jaime Mahoney of Bunker Hill Community College.

All Interactive Lessons