Cryptographic Hash and Integrity Protection

  • 4.5
Approx. 9 hours to complete

Course Summary

This course covers the basics of cryptographic hash functions and their use in protecting data integrity. Students will learn how to implement hash functions using Python and apply them to secure data in various applications.

Key Learning Points

  • Understand the principles behind cryptographic hash functions
  • Learn how to implement hash functions using Python
  • Apply hash functions to ensure data integrity in various applications

Job Positions & Salaries of people who have taken this course might have

    • USA: $90,000
    • India: ₹6,50,000
    • Spain: €40,000
    • USA: $90,000
    • India: ₹6,50,000
    • Spain: €40,000

    • USA: $75,000
    • India: ₹5,50,000
    • Spain: €35,000
    • USA: $90,000
    • India: ₹6,50,000
    • Spain: €40,000

    • USA: $75,000
    • India: ₹5,50,000
    • Spain: €35,000

    • USA: $85,000
    • India: ₹6,00,000
    • Spain: €45,000

Related Topics for further study


Learning Outcomes

  • Implement hash functions using Python
  • Understand how hash functions are used for data integrity
  • Apply hash functions to secure data in various applications

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of Python programming
  • Understanding of data security concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Introduction to Cryptography
  • Applied Cryptography

Related Education Paths


Related Books

Description

Welcome to Cryptographic Hash and Integrity Protection!

Outline

  • Cryptographic Hash Function
  • Instructor Introduction
  • Module Objectives
  • Hash Function
  • Insecure Hash Function
  • Cryptographic Hash Function Requirements: One-Way and Collision Properties
  • Cryptographic Hash Function Security
  • Cryptographic Hash Function Structure
  • Slides for Cryptographic Hash Function
  • Cryptographic Hash Function
  • Cryptographic Hash Function Applications
  • Module Objectives
  • Hash Chain
  • S/Key: One-Time Password
  • Hash Tree (Merkle Tree)
  • Cryptocurrency and Bitcoin
  • Lamport's scheme (S/Key)
  • Slides for Cryptographic Hash Applications
  • TESLA Broadcasting Authentication
  • Hash Chain and Hash Tree
  • Cryptocurrency and TESLA
  • Message Authentication Code (MAC)
  • Module Objectives
  • Message Authentication Approaches and Using Symmetric Encryption for Message Authentication
  • Message Authentication Code (MAC)
  • Brute-Force Attack on MAC
  • MAC Requirements
  • Digital Authentication Algorithm (DAA)
  • Cipher-Based MAC (CMAC)
  • Slides for Message Authentication Code
  • Message Authentication Code
  • Digital Signature
  • Module Objectives
  • Alice Uses Her Private Key
  • Digital Signature Properties Beyond Message Authentication
  • Digital Signature Requirements
  • Digital Signature Constrcution
  • Slides for Digital Signature
  • Digital Signature

Summary of User Reviews

This course on Cryptographic Hash & Integrity Protection has received high praise from many users. It covers a range of topics related to cryptography and hash algorithms, and is presented in an easy-to-understand manner. One key aspect that users appreciated was the hands-on approach to learning through practical exercises.

Pros from User Reviews

  • Clear and concise explanations of complex topics
  • Practical exercises for hands-on learning
  • Engaging and knowledgeable instructors
  • Great for beginners and those with some prior knowledge
  • Useful for understanding real-world applications of cryptography

Cons from User Reviews

  • Some users found the course too basic
  • Lack of depth in certain areas
  • Not enough focus on implementation in real-world scenarios
  • Could benefit from more interactive elements
  • Some users experienced technical issues with the platform
English
Available now
Approx. 9 hours to complete
Sang-Yoon Chang
University of Colorado System
Coursera

Instructor

Sang-Yoon Chang

  • 4.5 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses