- Level Professional
- المدة 9 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization.الوحدات
Instructor Introduction and Module Objectives
2
Videos
- Instructor Introduction
- Module Objectives
1
Readings
- Get help and meet other learners in this course. Join your discussion forums!
Hash Function
2
Videos
- Hash Function
- Insecure Hash Function
Cryptographic Hash Function Requirements
1
Videos
- Cryptographic Hash Function Requirements: One-Way and Collision Properties
Cryptographic Hash Function Security
1
Videos
- Cryptographic Hash Function Security
Cryptographic Hash Function Structure
1
Assignment
- Cryptographic Hash Function
1
Peer Review
- Applying Hash Function
1
Videos
- Cryptographic Hash Function Structure
1
Readings
- Slides for Cryptographic Hash Function
Module Objectives
1
Videos
- Module Objectives
Hash Chain
1
Videos
- Hash Chain
One-Time Password
1
Videos
- S/Key: One-Time Password
1
Readings
- Lamport's scheme (S/Key)
Hash Tree
1
Assignment
- Hash Chain and Hash Tree
1
Videos
- Hash Tree (Merkle Tree)
1
Readings
- Slides for Cryptographic Hash Applications
Hash Applications: Cryptocurrency and Broadcast Authentication
1
Assignment
- Cryptocurrency and TESLA
1
Videos
- Cryptocurrency and Bitcoin
1
Readings
- TESLA Broadcasting Authentication
Module Objectives
1
Videos
- Module Objectives
Message Authentication Approaches
1
Videos
- Message Authentication Approaches and Using Symmetric Encryption for Message Authentication
Message Authentication Code (MAC)
1
Videos
- Message Authentication Code (MAC)
MAC Security
1
Videos
- Brute-Force Attack on MAC
MAC Requirements
1
Videos
- MAC Requirements
MAC Using Block Ciphers
1
Assignment
- Message Authentication Code
2
Videos
- Digital Authentication Algorithm (DAA)
- Cipher-Based MAC (CMAC)
1
Readings
- Slides for Message Authentication Code
Module Objectives
1
Videos
- Module Objectives
Revisiting Asymmetric Cryptography
1
Videos
- Alice Uses Her Private Key
Digital Signature Properties
1
Videos
- Digital Signature Properties Beyond Message Authentication
Digital Signature Requirements
1
Videos
- Digital Signature Requirements
Digital Signature Construction
1
Assignment
- Digital Signature
2
Peer Review
- Public-Key Cryptography for Both Confidentiality and Source Authentication
- MAC vs. Digital Signature
1
Videos
- Digital Signature Constrcution
1
Readings
- Slides for Digital Signature
Auto Summary
Discover the "Cryptographic Hash and Integrity Protection" course, perfect for IT & Computer Science professionals. This Coursera course, part of the Applied Cryptography specialization, delves into cryptographic hash functions, message authentication codes, and digital signatures. Led by industry experts, it offers 540 minutes of in-depth content. Available with a Starter subscription, it’s ideal for those seeking advanced knowledge in cybersecurity and data integrity.

Sang-Yoon Chang