Cryptography #iGCSE #ComputerScience
One of the nice and not-so-nice things about vague arrangements documents is that you have to work out how to best fill the gap.
![](http://cdni.wired.co.uk/620x413/d_f/encryption_1.jpg)
Encryption methods are part of the Computer Security section of the course - symmetric and asymmetric encryption to be exact - and, while I could simply put two slides up on the screen and move on, I saw this as an opportunity …
Keep reading with a 7-day free trial
Subscribe to Caffeine Tangent to keep reading this post and get 7 days of free access to the full post archives.