About this Course

17,800 recent views

Learner Career Outcomes

33%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 9 hours to complete
English

Learner Career Outcomes

33%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 9 hours to complete
English

Offered by

Placeholder

University of Colorado System

Syllabus - What you will learn from this course

Week
1

Week 1

2 hours to complete

Cryptographic Hash Function

2 hours to complete
7 videos (Total 19 min), 1 reading, 2 quizzes
7 videos
Module Objectives55s
Hash Function55s
Insecure Hash Function2m
Cryptographic Hash Function Requirements: One-Way and Collision Properties4m
Cryptographic Hash Function Security3m
Cryptographic Hash Function Structure2m
1 reading
Slides for Cryptographic Hash Function15m
1 practice exercise
Cryptographic Hash Function40m
Week
2

Week 2

3 hours to complete

Cryptographic Hash Function Applications

3 hours to complete
5 videos (Total 14 min), 3 readings, 2 quizzes
5 videos
Hash Chain1m
S/Key: One-Time Password4m
Hash Tree (Merkle Tree)4m
Cryptocurrency and Bitcoin1m
3 readings
Lamport's scheme (S/Key)30m
Slides for Cryptographic Hash Applications15m
TESLA Broadcasting Authentication1h 10m
2 practice exercises
Hash Chain and Hash Tree40m
Cryptocurrency and TESLA8m
Week
3

Week 3

1 hour to complete

Message Authentication Code (MAC)

1 hour to complete
7 videos (Total 16 min), 1 reading, 1 quiz
7 videos
Message Authentication Approaches and Using Symmetric Encryption for Message Authentication2m
Message Authentication Code (MAC)3m
Brute-Force Attack on MAC3m
MAC Requirements2m
Digital Authentication Algorithm (DAA)1m
Cipher-Based MAC (CMAC)1m
1 reading
Slides for Message Authentication Code15m
1 practice exercise
Message Authentication Code45m
Week
4

Week 4

2 hours to complete

Digital Signature

2 hours to complete
5 videos (Total 8 min), 1 reading, 3 quizzes
5 videos
Alice Uses Her Private Key1m
Digital Signature Properties Beyond Message Authentication2m
Digital Signature Requirements1m
Digital Signature Constrcution1m
1 reading
Slides for Digital Signature15m
1 practice exercise
Digital Signature25m

Reviews

TOP REVIEWS FROM CRYPTOGRAPHIC HASH AND INTEGRITY PROTECTION

View all reviews

About the Applied Cryptography Specialization

Applied Cryptography

Frequently Asked Questions

More questions? Visit the Learner Help Center.