University of Colorado Boulder - Cryptographic Hash and Integrity Protection
- Offered byCoursera
Cryptographic Hash and Integrity Protection at Coursera Overview
Duration | 9 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Cryptographic Hash and Integrity Protection at Coursera Highlights
- 33%
got a tangible career benefit from this course. - Earn a shareable certificate upon completion.
- Flexible deadlines according to your schedule.
Cryptographic Hash and Integrity Protection at Coursera Course details
- Welcome to Cryptographic Hash and Integrity Protection!
- This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.
- This course is a part of the Applied Cryptography specialization.
Cryptographic Hash and Integrity Protection at Coursera Curriculum
Cryptographic Hash Function
Instructor Introduction
Module Objectives
Hash Function
Insecure Hash Function
Cryptographic Hash Function Requirements: One-Way and Collision Properties
Cryptographic Hash Function Security
Cryptographic Hash Function Structure
Slides for Cryptographic Hash Function
Cryptographic Hash Function
Cryptographic Hash Function Applications
Module Objectives
Hash Chain
S/Key: One-Time Password
Hash Tree (Merkle Tree)
Cryptocurrency and Bitcoin
Lamport's scheme (S/Key)
Slides for Cryptographic Hash Applications
TESLA Broadcasting Authentication
Hash Chain and Hash Tree
Cryptocurrency and TESLA
Message Authentication Code (MAC)
Module Objectives
Message Authentication Approaches and Using Symmetric Encryption for Message Authentication
Message Authentication Code (MAC)
Brute-Force Attack on MAC
MAC Requirements
Digital Authentication Algorithm (DAA)
Cipher-Based MAC (CMAC)
Slides for Message Authentication Code
Message Authentication Code
Digital Signature
Module Objectives
Alice Uses Her Private Key
Digital Signature Properties Beyond Message Authentication
Digital Signature Requirements
Digital Signature Constrcution
Slides for Digital Signature
Digital Signature