Cybersecurity Module 3: Introduction to Cryptography

Understand how modern cryptography keeps data secure in transit and at rest - from symmetric and asymmetric encryption to real-world examples like RSA, HTTPS and classic ciphers.

← Back to Module Overview

Cryptography forms the backbone of modern cybersecurity - enabling secure communication, privacy, and digital trust. This module introduces essential encryption methods and breaks down how they work in practice.

You will compare symmetric and asymmetric encryption, see how algorithms like RSA support HTTPS, and explore a classic Caesar cipher example to reinforce how substitution ciphers work.

"Strong cryptography is not about hiding information - it is about making sure only the right people can read it."

🔎 What you will learn

🔐 Symmetric key encryption

Symmetric encryption uses a single shared key for both encryption and decryption. It is fast and widely used for protecting files and data in transit.

🔑 Asymmetric public key encryption

Asymmetric encryption uses two keys - a public key to encrypt and a private key to decrypt. It underpins secure internet protocols and digital identity.

📊 Symmetric vs asymmetric - key differences

🔄 Caesar cipher (ROT13 demo)

The Caesar cipher is a classic encryption technique. Each letter is shifted by a fixed amount. ROT13 is a common example that shifts letters by 13 positions.

Encrypted: ubcrlbherawblvatguvfoybtcbfg

Decrypted (ROT13): hopeyourenjoyingthisblogpost

💡 Tip: Try creating your own Caesar cipher encoder or decoder as a coding challenge.

✅ Key takeaway

Most secure websites use asymmetric encryption to exchange keys, then switch to symmetric encryption for fast and efficient data transfer.

🧠 Quick Quiz: Test Your Cryptography Knowledge

1. Which encryption type uses only one key for both encryption and decryption?



2. What is the main drawback of symmetric encryption?



3. Which of the following is an asymmetric encryption algorithm?



4. In asymmetric encryption, what does the public key do?



5. What kind of cipher was Caesar's method?



Celestial Ant
“Need guidance?”