CYBER.ORG: AP Cybersecurity – Lesson 10.1.2 – Asymmetric Encryption

Objective:

  • Identify the strengths of using asymmetric encryption
  • Explain the steps involved with asymmetric encryption

Standards:


CompTIA Security+ Objective(s)

1.4 Explain the importance of using appropriate cryptographic solutions.

  • Public key infrastructure (PKI)
    • Public key
    • Private key
    • Key escrow
  • Encryption
    • Asymmetric
    • Key exchange
    • Algorithms
    • Key length

Guiding Question:

How does asymmetric encryption allow the protection of sensitive information without the difficulty of sharing secret keys?

Resources:

  • Lesson 10.1.2 – Asymmetric Encryption.pptx presentation and Activity 10.1.2- Investigating RSA keypairs form available on Google Classroom

Assignment:

  1. Read the Lesson 10.1.2 – Asymmetric Encryption.pptx presentation in today’s class.
  2. Choose a partner and complete Part A of the Activity 10.1.2- Investigating RSA keypairs Google Form provided in the Google Classroom. Answer the three Part A: Closing questions for discussion in your form.
  3. Proceed to Part B, and paste a screenshot of the decrypted message received from your partner in Cyberchef into the Form to complete the lab. (50 pts)

Assigned: April 8th, 2026
Teacher Pacing Due Date: April 9th, 2026