1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

2.Decrypt this cipher text into a binary string: 106

3.Now that you can see how public and private keys work in a real-world scenario, write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.

Asymmetric encryption, which uses both a public and private key, is commonly used for secure internet communications. A sender uses the recipient's public key to encrypt the message, which only the recipient's private key can decrypt. This ensures that only the intended recipient can read the message, providing a higher level of security than symmetric encryption. This method also allows for secure digital signatures, as the sender can use their own private key to sign the message, verifying their identity. Overall, asymmetric encryption is an essential tool in ensuring the confidentiality and authenticity of internet communications.