Asymmetric Cryptography and Key Management

  • 4.7
Approx. 9 hours to complete

Course Summary

This course teaches the fundamentals of asymmetric cryptography, including public/private key encryption, digital signatures, and key exchange protocols.

Key Learning Points

  • Understand the basics of public key cryptography
  • Learn how to use digital signatures and key exchange protocols
  • Gain practical experience implementing asymmetric cryptography in Python

Related Topics for further study


Learning Outcomes

  • Understand the principles of asymmetric cryptography
  • Implement digital signatures and key exchange protocols in Python
  • Apply cryptographic techniques to secure communications and transactions

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of programming concepts
  • Familiarity with mathematical concepts such as modular arithmetic and prime numbers

Course Difficulty Level

Intermediate

Course Format

  • Self-paced
  • Online
  • Video lectures
  • Programming assignments

Similar Courses

  • Cryptography I
  • Applied Cryptography
  • Cryptography and Information Theory

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Whitfield Diffie

Related Books

Description

Welcome to Asymmetric Cryptography and Key Management!

Outline

  • Asymmetric Cryptography Overview
  • Instructor Introduction
  • Module Objectives
  • What is Asymmetric Cryptography?
  • Asymmetric Encryption for Message Confidentiality
  • Digital Signature for Authentication
  • Cipher Requirements and Trapdoor One-Way Function
  • Lecture Slides for Asymmetric Cryptography Overview
  • Asymmetric Cryptography Overview
  • RSA Algorithm
  • Module Objectives
  • Prime Factorization Problem
  • RSA Encryption and Decryption
  • RSA Key Setup
  • RSA Example
  • Security of RSA
  • Lecture Slides for RSA Algorithm
  • Paper by Rivest, Shamir, and Adleman
  • RSA Operations
  • RSA Algorithm
  • Diffie-Hellman Key Exchange
  • Module Objectives
  • Discrete Logarithm
  • Primitive Root of a Prime Integer
  • Discrete Logarithm Problem
  • Diffie-Hellman Key Exchange Overview
  • Diffie-Hellman Key-Exchange Protocol
  • Man-in-the-Middle Attack
  • El Gamal Encryption
  • Diffie and Hellman, 1976
  • Lecture Slides for Diffie-Hellman Key Exchange
  • Discrete Logarithm and Primitive Root
  • Diffie-Hellman Key Exchange and El Gamal Encryption
  • Key Distribution and Management
  • Module Objectives
  • Key Distribution Approaches
  • Key Hierarchy and Decentralized Key Distribution
  • Public-Key Authority
  • Public-Key Certificate and Public-Key Infrastructure (PKI)
  • Lecture Slides for Key Distribution and Management
  • Key Distribution and Management

Summary of User Reviews

This course on asymmetric cryptography received high praise from many users. It covers a wide range of topics and is taught in a clear and easy-to-understand manner.

Key Aspect Users Liked About This Course

The course is very informative and covers a lot of ground in a short amount of time.

Pros from User Reviews

  • The instructor is very knowledgeable and explains concepts clearly
  • The course covers a wide range of topics related to asymmetric cryptography
  • The course is well-structured and easy to follow
  • The course provides practical examples and exercises to help reinforce learning

Cons from User Reviews

  • Some users found the course material to be too advanced
  • The course can be quite technical and dense at times
  • Some users found the pace of the course to be too fast
  • The course does not cover some more advanced topics in depth
  • Some users found the course to be too theoretical and not practical enough
English
Available now
Approx. 9 hours to complete
Sang-Yoon Chang
University of Colorado System
Coursera

Instructor

Sang-Yoon Chang

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses