TrueschoTruescho
All Courses
Cryptographic Hash and Integrity Protection
Coursera
Course
Unknown

Cryptographic Hash and Integrity Protection

University of Colorado System

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptograp

Unknown4 weeks10,892 enrolled

About this Course

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptograp

What You'll Learn

  • شرح خصائص دوال التجزئة ولماذا تحمي السلامة
  • استخدام سلاسل التجزئة وأشجار ميركل في سيناريوهات تحقق
  • تمييز MAC عن التواقيع الرقمية من حيث الضمانات والافتراضات
  • اختيار آلية مناسبة لتحقيق السلامة والمصداقية وعدم التنصل

Instructors

S

Sang-Yoon Chang

Computer Science

Topics

Information Assurance
Public Key Cryptography Standards (PKCS)
Authentications
Data Integrity
Data Security
Cryptography
Encryption

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

دوال التجزئة
شجرة ميركل
سلاسل التجزئة
سلامة البيانات
مصادقة الرسائل
MAC
تواقيع رقمية

Start Learning Now