Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.4.2j

CodeHS Lessons

Evaluate strengths and weaknesses of an encryption method in context.

Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
10.1 Cryptography: Then, Now, and Future
Standard
1.12 Cryptography
Standard
1.14 Cryptography
1.15 Asymmetric Encryption
Standard
1.13 Cryptography and Cryptocurrency
Standard
1.13 Cryptography
1.14 Asymmetric Encryption
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
3.1 Cryptography: Then, Now, and Future
3.2 Symmetric Encryption
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
6.1 Cryptography: Then, Now, and Future
6.2 Symmetric Encryption
6.3 Asymmetric Encryption
6.4 Authentication Methods
Standard
3.1 Cryptography: Then, Now, and Future
3.2 Symmetric Encryption
3.3 Asymmetric Encryption
3.4 Authentication Methods