- Level Professional
- المدة 9 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol and learn how and why they work to secure communications/access. Lastly, we will discuss the key distribution and management for both symmetric keys and public keys and describe the important concepts in public-key distribution such as public-key authority, digital certificate, and public-key infrastructure. This course also describes some mathematical concepts, e.g., prime factorization and discrete logarithm, which become the bases for the security of asymmetric primitives, and working knowledge of discrete mathematics will be helpful for taking this course; the Symmetric Cryptography course (recommended to be taken before this course) also discusses modulo arithmetic. This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.الوحدات
Instructor Introduction and Module Objectives
2
Videos
- Instructor Introduction
- Module Objectives
1
Readings
- Get help and meet other learners in this course. Join your discussion forums!
What is Asymmetric Cryptography?
1
Videos
- What is Asymmetric Cryptography?
Alice, Bob, and Eve and the Public-Key-Private-Key Pair
2
Videos
- Asymmetric Encryption for Message Confidentiality
- Digital Signature for Authentication
Cipher Requirements and Trapdoor One-Way Function
1
Assignment
- Asymmetric Cryptography Overview
1
Videos
- Cipher Requirements and Trapdoor One-Way Function
1
Readings
- Lecture Slides for Asymmetric Cryptography Overview
Asymmetric Cryptography Framework
1
Peer Review
- Asymmetric Cryptography Framework
Module Objectives
1
Videos
- Module Objectives
Prime Factorization
1
Videos
- Prime Factorization Problem
RSA Encryption and Decryption
1
Videos
- RSA Encryption and Decryption
RSA Key Setup
1
Assignment
- RSA Operations
2
Videos
- RSA Key Setup
- RSA Example
Security of RSA
1
Assignment
- RSA Algorithm
1
Videos
- Security of RSA
2
Readings
- Lecture Slides for RSA Algorithm
- Paper by Rivest, Shamir, and Adleman
Module Objectives
1
Videos
- Module Objectives
Discrete Logarithm Problem
1
Assignment
- Discrete Logarithm and Primitive Root
3
Videos
- Discrete Logarithm
- Primitive Root of a Prime Integer
- Discrete Logarithm Problem
Diffie-Hellman Key Exchange
1
Assignment
- Diffie-Hellman Key Exchange and El Gamal Encryption
4
Videos
- Diffie-Hellman Key Exchange Overview
- Diffie-Hellman Key-Exchange Protocol
- Man-in-the-Middle Attack
- El Gamal Encryption
2
Readings
- Diffie and Hellman, 1976
- Lecture Slides for Diffie-Hellman Key Exchange
Module Objectives
1
Videos
- Module Objectives
Key Distribution
1
Videos
- Key Distribution Approaches
Key Hierarchy
1
Videos
- Key Hierarchy and Decentralized Key Distribution
Public-Key Authority
1
Videos
- Public-Key Authority
Public-Key Certificate and Public-Key Infrastructure
1
Assignment
- Key Distribution and Management
1
Videos
- Public-Key Certificate and Public-Key Infrastructure (PKI)
1
Readings
- Lecture Slides for Key Distribution and Management
Auto Summary
Explore the world of public-key cryptography with "Asymmetric Cryptography and Key Management." This professional-level course, led by Coursera, delves into asymmetric cryptography principles, RSA cipher algorithms, and Diffie-Hellman Key Exchange protocols. Enhance your understanding of key distribution, public-key infrastructure, and critical mathematical concepts over 540 minutes of content. Ideal for IT and Computer Science enthusiasts, with Starter and Professional subscription options available.

Sang-Yoon Chang