Skip main navigation

Activity 4: Summary and next steps

In this activity you learned about end-to-end encryption and where it is used. We also explored the idea of hash functions and digital signatures.
Computer screens, lightbulb, cursor icon and question mark.

Congratulations! You have come to the end of Activity 4. In this activity you learned about end-to-end encryption and where it is used. We also explored the idea of hash functions and digital signatures.

All that is left to do is reflect on your learning and complete the short graded assignment!  By completing 90% of the steps in the course and achieving a mark of 70% or more in the assignment you will earn a Certificate of Achievement. You can share this with your friends and family to show them what you’ve learned. You can also share it on social media, such as LinkedIn, as a way of showing employers and colleagues your new skills and knowledge.

This article is from the free online

An Introduction to Cryptography

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now