Coursera
Coursera Logo

University of Colorado Boulder - Cryptographic Hash and Integrity Protection 

  • Offered byCoursera

Cryptographic Hash and Integrity Protection
 at 
Coursera 
Overview

Duration

9 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cryptographic Hash and Integrity Protection
 at 
Coursera 
Highlights

  • 33%
    got a tangible career benefit from this course.
  • Earn a shareable certificate upon completion.
  • Flexible deadlines according to your schedule.
Details Icon

Cryptographic Hash and Integrity Protection
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • Welcome to Cryptographic Hash and Integrity Protection!
  • This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.
  • This course is a part of the Applied Cryptography specialization.

Cryptographic Hash and Integrity Protection
 at 
Coursera 
Curriculum

Cryptographic Hash Function

Instructor Introduction

Module Objectives

Hash Function

Insecure Hash Function

Cryptographic Hash Function Requirements: One-Way and Collision Properties

Cryptographic Hash Function Security

Cryptographic Hash Function Structure

Slides for Cryptographic Hash Function

Cryptographic Hash Function

Cryptographic Hash Function Applications

Module Objectives

Hash Chain

S/Key: One-Time Password

Hash Tree (Merkle Tree)

Cryptocurrency and Bitcoin

Lamport's scheme (S/Key)

Slides for Cryptographic Hash Applications

TESLA Broadcasting Authentication

Hash Chain and Hash Tree

Cryptocurrency and TESLA

Message Authentication Code (MAC)

Module Objectives

Message Authentication Approaches and Using Symmetric Encryption for Message Authentication

Message Authentication Code (MAC)

Brute-Force Attack on MAC

MAC Requirements

Digital Authentication Algorithm (DAA)

Cipher-Based MAC (CMAC)

Slides for Message Authentication Code

Message Authentication Code

Digital Signature

Module Objectives

Alice Uses Her Private Key

Digital Signature Properties Beyond Message Authentication

Digital Signature Requirements

Digital Signature Constrcution

Slides for Digital Signature

Digital Signature

Cryptographic Hash and Integrity Protection
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cryptographic Hash and Integrity Protection
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...