Introduction to Encryption - Course Assessment

This assessment questionnaire gives you the opportunity to verifiy your learning progress. Thank you for taking this course!

Back to Overview

This is only an abridged excerpt from the course
Introduction to Encryption

Questionnaire

Which is the currently most used symmetric encryption system on the Internet?





The advantage of symmetric encryption in comparison to asymmetric encryption is in general:




Although the public key can be read by anyone, why does this fact alone not solve the key exchange problem?







Back to Overview

Chapters

Number Title Length
Start
1 Introduction (Full preview availabe) 1 min
2 Motivation: Why do we encrypt? (Full preview availabe) 4 min
3 What does Encrypting mean? (Full preview availabe) 2 min
4 Basics: Symmetric and asymmetric Encryption 3 min
5 Hybrid Encryption 3 min
6 Password-based Encryption (Full preview availabe) 1 min
7 Algorithms 1 min
8 Technical Parameters for Encryption I 7 min
9 Technical Parameters for Encryption II 3 min
10 Cryptographic Key Formats 1 min
11 Java program demonstration: Plaintext to AES encryption text 3 min
12 File and System encryption 6 min
13 Conclusion (Full preview availabe) 1 min
Course Assessment