Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Provider Logo

Cryptographic Hash and Integrity Protection

University of Colorado System via Coursera


Welcome to Cryptographic Hash and Integrity Protection!

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.

This course is a part of the Applied Cryptography specialization.

Taught by

Sang-Yoon Chang

Related Courses


0.0 rating, based on 0 reviews

Start your review of Cryptographic Hash and Integrity Protection

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free