Coursera
Coursera Logo

University of Colorado Boulder - Asymmetric Cryptography and Key Management 

  • Offered byCoursera

Asymmetric Cryptography and Key Management
 at 
Coursera 
Overview

Duration

9 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Asymmetric Cryptography and Key Management
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Intermediate Level
  • Approx. 9 hours to complete
  • English Subtitles: Arabic, French, Portuguese (European), Italian, Vietnamese, German, Russian, English, Spanish
Read more
Details Icon

Asymmetric Cryptography and Key Management
 at 
Coursera 
Course details

More about this course
  • Welcome to Asymmetric Cryptography and Key Management!
  • In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol and learn how and why they work to secure communications/access. Lastly, we will discuss the key distribution and management for both symmetric keys and public keys and describe the important concepts in public-key distribution such as public-key authority, digital certificate, and public-key infrastructure. This course also describes some mathematical concepts, e.g., prime factorization and discrete logarithm, which become the bases for the security of asymmetric primitives, and working knowledge of discrete mathematics will be helpful for taking this course; the Symmetric Cryptography course (recommended to be taken before this course) also discusses modulo arithmetic.
  • This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.
  • This course is part of multiple programs
  • This course can be applied to multiple Specializations or Professional Certificates programs. Completing this course will count towards your learning in any of the following programs:
  • Applied Cryptography Specialization
  • Introduction to Applied Cryptography Specialization
Read more

Asymmetric Cryptography and Key Management
 at 
Coursera 
Curriculum

Asymmetric Cryptography Overview

Instructor Introduction

Module Objectives

What is Asymmetric Cryptography?

Asymmetric Encryption for Message Confidentiality

Digital Signature for Authentication

Cipher Requirements and Trapdoor One-Way Function

Lecture Slides for Asymmetric Cryptography Overview

Asymmetric Cryptography Overview

RSA Algorithm

Module Objectives

Prime Factorization Problem

RSA Encryption and Decryption

RSA Key Setup

RSA Example

Security of RSA

Lecture Slides for RSA Algorithm

Paper by Rivest, Shamir, and Adleman

RSA Operations

RSA Algorithm

Diffie-Hellman Key Exchange

Module Objectives

Discrete Logarithm

Primitive Root of a Prime Integer

Discrete Logarithm Problem

Diffie-Hellman Key Exchange Overview

Diffie-Hellman Key-Exchange Protocol

Man-in-the-Middle Attack

El Gamal Encryption

Diffie and Hellman, 1976

Lecture Slides for Diffie-Hellman Key Exchange

Discrete Logarithm and Primitive Root

Diffie-Hellman Key Exchange and El Gamal Encryption

Key Distribution and Management

Module Objectives

Key Distribution Approaches

Key Hierarchy and Decentralized Key Distribution

Public-Key Authority

Public-Key Certificate and Public-Key Infrastructure (PKI)

Lecture Slides for Key Distribution and Management

Key Distribution and Management

Asymmetric Cryptography and Key Management
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Asymmetric Cryptography and Key Management
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...