Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

Activity 3: Summary and next steps

In this activity we have looked at some modern day cryptography. We have learned of two modern approaches: private key and private key cryptography.
Computer screens, lightbulb, cursor icon and question mark.

In this activity we have looked at some modern day cryptography. We have learned of two modern approaches: private key cryptography and public key cryptography.

We looked at a specific example of a public key cryptography technique called RSA and saw how it can be used for encryption and for digital signatures. We have learned how to generate RSA keys.

This activity has been an introduction to modern day cryptography. You now know about the basics of modern cryptography. There is lots of advanced maths behind why modern day cryptography is secure. We won’t cover it in this course but if you continue to study cryptography at some point you will encounter it.

This article is from the free online

An Introduction to Cryptography

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now