Cryptographic Hash and Integrity Protection (Coursera)

Cryptographic Hash and Integrity Protection (Coursera)

Añade tu reseña
Añadir a Mis FavoritosAñadido a tus favoritosEliminado de tus favoritos 0
Añadir para comparar

Descripción de “Cryptographic Hash and Integrity Protection (Coursera)”

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys.

We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.

Course 4 of 4 in the Applied Cryptography Specialization

Syllabus

WEEK 1

Cryptographic Hash Function

Cryptographic hash function is a fundamental building block in modern cryptography and is used for digital signature, message authentication, anomaly detection, pseudo-random number generator, password security, and so on. This module define cryptographic hash functions and contrast it with ordinary hash functions. It also describes the iterative structure for hash implementation to support the hash requirements.

Graded: Cryptographic Hash Function

Graded: Applying Hash Function

WEEK 2

Cryptographic Hash Function Applications

Building on the previous module defining cryptographic hash functions, this module review its uses and applications. We will first describe hash chain, which chains multiple hash functions in sequence, and apply hash chain for generating one-time passwords using a scheme called S/Key. Then, we will use hash functions to construct a binary tree and describe hash tree, also known as Merkle tree. Lastly, we will review the applications of hash function and hash tree for decentralized digital currency in the forms of cryptocurrency or bitcoins.

Graded: Hash Chain and Hash Tree

Graded: Cryptocurrency and TESLA

WEEK 3

Message Authentication Code (MAC)

Message authentication is to protect the message integrity and to perform sender authentication. This module describes message authentication code (MAC) which is based on symmetric keys. It contrasts MAC with hash functions or general encryption/decryption techniques and quantify the brute force attack difficulty for MAC and discuss the security requirements for MAC. The module also reviews two MAC implementations in Data Authentication Algorithm (DAA) and Cipher-Based MAC (CMAC), which are based on the use of block ciphers.

Graded: Message Authentication Code

WEEK 4

Digital Signature

Like physical signatures in paper transactions, digital signature provides sender authentication and non-repudiation. This module describes how to use public-key pair to ensure the source of the packet. Then, it describes the purpose of digital signatures and the corresponding requirements. Lastly, we review a digital signature construction, which is the basis for many digital signature implementations such as RSA signature and Digital Signature Standard (DSS).

Graded: Digital Signature

Graded: Public-Key Cryptography for Both Confidentiality and Source Authentication

Graded: MAC vs. Digital Signature

Especificaciones: Cryptographic Hash and Integrity Protection (Coursera)

Curso ofrecido por
Disponibilidad

✔ Disponible

Plataforma

Universidad

Impartido por

Sang-Yoon Chang

País

USA

Nivel, duración y fechas
Nivel

Intermedio

Fecha

04/05/2020

Duración

4 semanas

Tiempo necesario

2-4 horas/semana

Idioma del curso
Idioma vehicular

Inglés

Subtítulos

No informado

Exámenes y Certificados
Certificados

Certificado de Pago

Exámenes/Proyectos

Con Examen/Proyecto Final de pago

User Reviews

0.0 fuera de 5
0
0
0
0
0
Write a review

Aún no hay reseñas.

Se el primero en opinar sobre “Cryptographic Hash and Integrity Protection (Coursera)”

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Antes de enviar tu opinión, has de aceptar nuestra política de cookies y privacidad

Cryptographic Hash and Integrity Protection (Coursera)
Cryptographic Hash and Integrity Protection (Coursera)

Este sitio web utiliza cookies para un correcto funcionamiento. Si continúas navegando estás dando tu consentimiento para estas cookies y aceptas nuestra política de cookies, clic para más información.

ACEPTAR
Aviso de cookies
Comparar artículos
  • Total (0)
Comparar
0