开始时间: 03/28/2020 持续时间: Unknown

所在平台: Coursera

课程类别: 其他类别

大学或机构: CourseraNew



Explore 1600+ online courses from top universities. Join Coursera today to learn data science, programming, business strategy, and more.


第一个写评论        关注课程


Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography 3. Define the basic requirements for cryptography 4. Identify processes to support secure protocols 5. Describe the process for implementing cryptographic systems 6. Define key management concepts 7. Define Public Key Infrastructure 8. Identify processes for key administration and validation 9. Describe the implementation of secure protocols

密码学:欢迎使用密码学! 密码术是在第三方在场的情况下确保通信安全的技术的实践和研究。您将学习如何保护信息以确保其完整性,机密性,真实性和不可否认性。 您将对加密概念以及如何应用它们,实现安全协议,密钥管理概念,密钥管理和验证以及公钥基础结构有一个基本的了解。 课程目标 1.应用密码学的基本概念 2.描述对称和非对称密码学的区别 3.定义密码学的基本要求 4.确定支持安全协议的过程 5.描述实施密码系统的过程 6.定义关键管理概念 7.定义公钥基础结构 8.确定密钥管理和验证的流程 9.描述安全协议的实现


Module Topics: Encryption Concepts, Methods of Cryptography, Specific Hashing, In Encryption Concepts you will learn about key concepts and definitions and high work factor. In Methods of Cryptography you will learn about stream-based ciphers, stream-based cipher rules, block ciphers, Initialization Vectors (IV) – Why are they needed? basic block cipher modes, evaluation of algorithms, common encryption techniques, encryption algorithm characteristics, and hashing. In Specific Hashing you will learn about message digest (MD) 2, 4, and 5, secure hash algorithm (SHA) 0, 1, and 2, hAVAL, RIPEMD-160, attacks on hashing algorithms and message authentication codes, and the birthday paradox.





Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communica