<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml"
        xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/v/the-internet-encryption-and-public-keys</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:data-encryption-techniques/v/the-internet-encryption-and-public-keys" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/college-careers-more/an-toan-internet/x8182d33f1114b84c:an-toan-internet/x8182d33f1114b84c:ki-thuat-ma-hoa-du-lieu/v/the-internet-encryption-and-public-keys" />
        
        <lastmod>2021-03-22T14:52:38Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="the-internet-encryption-and-public-keys">
            <Attribute name="title">Encryption and public keys</Attribute>
            <Attribute name="description">Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL &amp; TLS and HTTPS. </Attribute>
            
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/HrtrTq1PPY12TsFckENlTbPYVUR6WGw3MTv4yLNeWRuYTQq7nFce7H017Vl1MJIjmfB0822fveA3QttkC05nPUFx</video:thumbnail_loc>
            <video:title>Encryption and public keys</video:title>
            <video:description>Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL &amp; TLS and HTTPS. </video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/6-JjHa-qLPk.mp4/6-JjHa-qLPk.mp4</video:player_loc>
            <video:duration>400</video:duration>
            <video:category>Data encryption techniques</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/the-need-for-encryption</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/informatika-pocitace-a-internet/x8887af37e7f1189a:internet/x8887af37e7f1189a:sifrovani-dat/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/biblioteca-de-informatica/x3db0514e45fb5544:securitatea-datelor-online/x3db0514e45fb5544:tehnici-de-criptare/a/the-need-for-encryption" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:ky-thuat-ma-hoa-du-lieu-may-tinh-va-internet/a/the-need-for-encryption" />
        
        <lastmod>2021-04-29T07:58:39Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="the-need-for-encryption">
            <Attribute name="title">The need for encryption</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/informatika-pocitace-a-internet/x8887af37e7f1189a:internet/x8887af37e7f1189a:sifrovani-dat/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/biblioteca-de-informatica/x3db0514e45fb5544:securitatea-datelor-online/x3db0514e45fb5544:tehnici-de-criptare/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:ky-thuat-ma-hoa-du-lieu-may-tinh-va-internet/a/encryption-decryption-and-code-cracking" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking" />
        
        <lastmod>2021-04-29T07:57:27Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="encryption-decryption-and-code-cracking">
            <Attribute name="title">Encryption, decryption, and cracking</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/symmetric-encryption-techniques</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/informatika-pocitace-a-internet/x8887af37e7f1189a:internet/x8887af37e7f1189a:sifrovani-dat/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/biblioteca-de-informatica/x3db0514e45fb5544:securitatea-datelor-online/x3db0514e45fb5544:tehnici-de-criptare/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:ky-thuat-ma-hoa-du-lieu-may-tinh-va-internet/a/symmetric-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/symmetric-encryption-techniques" />
        
        <lastmod>2026-03-10T18:10:37.467907711Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="symmetric-encryption-techniques">
            <Attribute name="title">Symmetric encryption techniques</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/symmetric-encryption</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/symmetric-encryption" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/symmetric-encryption" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/symmetric-encryption" />
        
        <lastmod>2021-04-29T07:56:36Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="symmetric-encryption">
            <Attribute name="title">Symmetric encryption</Attribute>
            <Attribute name="description">Check your understanding of symmetric encryption techniques, in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/informatika-pocitace-a-internet/x8887af37e7f1189a:internet/x8887af37e7f1189a:sifrovani-dat/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/biblioteca-de-informatica/x3db0514e45fb5544:securitatea-datelor-online/x3db0514e45fb5544:tehnici-de-criptare/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:ky-thuat-ma-hoa-du-lieu-may-tinh-va-internet/a/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption" />
        
        <lastmod>2025-02-13T22:35:16.682899287Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="public-key-encryption">
            <Attribute name="title">Public key encryption</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/public-key-encryption</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:ky-thuat-ma-hoa-du-lieu-may-tinh-va-internet/e/public-key-encryption" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/public-key-encryption" />
        
        <lastmod>2021-04-29T07:53:32Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="public-key-encryption">
            <Attribute name="title">Public key encryption</Attribute>
            <Attribute name="description">Check your understanding of cryptography and public key encryption, in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/data-encryption-techniques</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/informatika-pocitace-a-internet/x8887af37e7f1189a:internet/x8887af37e7f1189a:sifrovani-dat/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:data-encryption/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:data-encryption-techniques/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/biblioteca-de-informatica/x3db0514e45fb5544:securitatea-datelor-online/x3db0514e45fb5544:tehnici-de-criptare/e/data-encryption-techniques" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:ky-thuat-ma-hoa-du-lieu-may-tinh-va-internet/e/data-encryption-techniques" />
        
        <lastmod>2022-04-07T15:37:10.897785954Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="data-encryption-techniques">
            <Attribute name="title">Data encryption techniques</Attribute>
            <Attribute name="description">Check your understanding of data encryption techniques (symmetric encryption and public key encryption) in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
</urlset>
