Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Online Course

Cryptography and Hashing Overview

University of California, Irvine via Coursera

38
  • Provider Coursera
  • Cost Free Online Course (Audit)
  • Session In progress
  • Language English
  • Certificate Paid Certificate Available
  • Effort 5-10 hours a week
  • Duration 4 weeks long
  • Learn more about MOOCs

Taken this course? Share your experience with other students. Write review

Overview

Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy.

Syllabus

The Nature of Ownership
-This week we will examine and study the ways that the blockchain keeps track of ownership transactions through the use of electronic ledgers. After an item changes hands many times, one can literally see each handoff by looking at the continuously growing string of data blocks in the blockchain.

Organizational Usage of Blockchain Technology
-In this second week we will explore and discuss the vast array of benefits that a blockchain technology system can bring to different industries and business markets. We will also consider together how Blockchain technology is an ideal system to manage educational achievement and merit.

Cryptography and Hashing
-The key to the blockchain’s success is the use of hash values and encryption. These are the same technologies that allow you to log into your favorite website without revealing your password and the same technologies that allow you to send a private, encrypted text message. By the end of the week you will apply a hashing algorithm to a character string and see the results.

Applying Hashes
-As you will see in this final week, it is sometimes important to step back from a purely functional discussion of what the blockchain can do to what it means when it does it. You will apply cryptography and hashing to a simple scenario in order to determine the authenticity of a simulated email message.

Taught by

Stefano M. Stefan

Help Center

Most commonly asked questions about Coursera

Reviews for Coursera's Cryptography and Hashing Overview Based on 0 reviews

  • 5 star 0%
  • 4 star 0%
  • 3 star 0%
  • 2 star 0%
  • 1 star 0%

Did you take this course? Share your experience with other students.

Write a review

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free