Cryptographic Hash and Integrity Protection
University of Colorado System via Coursera
-
134
-
- Write review
Overview
Class Central Tips
This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.
This course is a part of the Applied Cryptography specialization.
Taught by
Sang-Yoon Chang
Related Courses
-
Cryptography and Information Theory
University of Colorado System
-
Asymmetric Cryptography and Key Management
University of Colorado System
-
Symmetric Cryptography
University of Colorado System
-
Applied Cryptography
University of Colorado System
-
Mathematical Foundations for Cryptography
University of Colorado System
-
Classical Cryptosystems and Core Concepts
University of Colorado System
Reviews
0.0 rating, based on 0 reviews