About this Course
6,660 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 7 hours to complete

Suggested: 2-5 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 7 hours to complete

Suggested: 2-5 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
2 hours to complete

Asymmetric Cryptography Overview

6 videos (Total 25 min), 1 reading, 2 quizzes
6 videos
Module Objectives1m
What is Asymmetric Cryptography?6m
Asymmetric Encryption for Message Confidentiality4m
Digital Signature for Authentication4m
Cipher Requirements and Trapdoor One-Way Function4m
1 reading
Lecture Slides for Asymmetric Cryptography Overview15m
1 practice exercise
Asymmetric Cryptography Overview30m
Week
2
2 hours to complete

RSA Algorithm

6 videos (Total 18 min), 2 readings, 2 quizzes
6 videos
Prime Factorization Problem2m
RSA Encryption and Decryption3m
RSA Key Setup2m
RSA Example4m
Security of RSA5m
2 readings
Lecture Slides for RSA Algorithm15m
Paper by Rivest, Shamir, and Adleman50m
2 practice exercises
RSA Operations30m
RSA Algorithm30m
Week
3
3 hours to complete

Diffie-Hellman Key Exchange

8 videos (Total 20 min), 2 readings, 2 quizzes
8 videos
Discrete Logarithm2m
Primitive Root of a Prime Integer3m
Discrete Logarithm Problem1m
Diffie-Hellman Key Exchange Overview3m
Diffie-Hellman Key-Exchange Protocol3m
Man-in-the-Middle Attack3m
El Gamal Encryption1m
2 readings
Diffie and Hellman, 19761h
Lecture Slides for Diffie-Hellman Key Exchange15m
2 practice exercises
Discrete Logarithm and Primitive Root30m
Diffie-Hellman Key Exchange and El Gamal Encryption30m
Week
4
1 hour to complete

Key Distribution and Management

5 videos (Total 20 min), 1 reading, 1 quiz
5 videos
Key Distribution Approaches3m
Key Hierarchy and Decentralized Key Distribution4m
Public-Key Authority5m
Public-Key Certificate and Public-Key Infrastructure (PKI)5m
1 reading
Lecture Slides for Key Distribution and Management15m
1 practice exercise
Key Distribution and Management50m
4.6
5 ReviewsChevron Right

Top reviews from Asymmetric Cryptography and Key Management

By CVJan 16th 2018

great lectures.Thank you Sir and Thank you Coursera

Instructor

Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.