Cryptography and Hashing Overview

  • 0.0
Approx. 10 hours to complete

Course Summary

Learn about the basics of cryptography and how to use it to secure your data. This course covers hash functions, digital signatures, and message authentication codes.

Key Learning Points

  • Understand the concepts of cryptography and how it can be used to secure your data
  • Learn about hash functions and how they are used to ensure data integrity
  • Explore digital signatures and how they can be used to authenticate messages
  • Discover message authentication codes and how they can be used to verify the authenticity of a message

Related Topics for further study


Learning Outcomes

  • Understand the basics of cryptography and its uses
  • Implement hash functions to ensure data integrity
  • Create and verify digital signatures for message authentication

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer science concepts
  • Familiarity with programming languages such as Python

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cryptography I
  • Applied Cryptography

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Whitfield Diffie

Related Books

Description

Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy.

Outline

  • The Nature of Ownership
  • Round Table Discussion - The Ownership Problem
  • Blockchain Basics
  • Supplemental Videos (Optional)
  • The Nature of Ownership
  • Organizational Usage of Blockchain Technology
  • Aleksandra Skrzypczak – Golem Factory Co-founder
  • Blockchain Basics
  • Supplemental Videos (Optional)
  • Cryptography and Hashing
  • Round Table Discussion - Cryptography and Hashing
  • Amira Bougera and Sajida Zouarhi – HellHound Co-founders
  • Blockchain Basics
  • Privacy by Design for All dApps, Now
  • Supplemental Video (Optional)
  • Cryptography and Hashing
  • Applying Hashes
  • Jaguar. Tinybox. Strawberry - Nicholas Salloum
  • The Internet of Money
  • Blockchain Basics
  • Supplemental Video (Optional)

Summary of User Reviews

The Crypto and Hashing course on Coursera has received positive reviews from learners. The course provides an in-depth understanding of cryptography and hashing algorithms. Many users have appreciated the course's practical approach to learning.

Key Aspect Users Liked About This Course

The course's practical approach to learning has been praised by many users.

Pros from User Reviews

  • In-depth understanding of cryptography and hashing algorithms
  • Practical approach to learning
  • Engaging and knowledgeable instructors
  • Good pacing of the course
  • Clear and concise explanations

Cons from User Reviews

  • Some users found the course too challenging
  • Not enough hands-on exercises
  • Limited opportunities for interaction with instructors and peers
  • Some users felt that the course was too theoretical
  • The course could benefit from more real-world examples
English
Available now
Approx. 10 hours to complete
Stefano M. Stefan
University of California, Irvine
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses