Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

Steganography is similar to cryptography since it is used to achieve confidentiality. Steganography requires two items, a container and the data that will be hidden. Containers used include image, audio, video, or Office document files. The video, Steganography – Hiding Data inside Pictures or Sound files (6:16) provides a demonstration using a tool called Steghide.