Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.4.2j

CodeHS Lessons

Evaluate strengths and weaknesses of an encryption method in context.

Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods