Objective:
- Identify the strengths of using asymmetric encryption
- Explain the steps involved with asymmetric encryption
Standards:
CompTIA Security+ Objective(s)
1.4 Explain the importance of using appropriate cryptographic solutions.
- Public key infrastructure (PKI)
- Public key
- Private key
- Key escrow
- Encryption
- Asymmetric
- Key exchange
- Algorithms
- Key length
Guiding Question:
How does asymmetric encryption allow the protection of sensitive information without the difficulty of sharing secret keys?
Resources:
- Lesson 10.1.2 – Asymmetric Encryption.pptx presentation and Activity 10.1.2- Investigating RSA keypairs form available on Google Classroom
Assignment:
- Read the Lesson 10.1.2 – Asymmetric Encryption.pptx presentation in today’s class.
- Choose a partner and complete Part A of the Activity 10.1.2- Investigating RSA keypairs Google Form provided in the Google Classroom. Answer the three Part A: Closing questions for discussion in your form.
- Proceed to Part B, and paste a screenshot of the decrypted message received from your partner in Cyberchef into the Form to complete the lab. (50 pts)
Assigned: April 8th, 2026
Teacher Pacing Due Date: April 9th, 2026