RiseUpp Logo
Educator Logo

Cryptographic Hash and Integrity Protection

Master cryptographic hash functions, message authentication, and digital signatures. Perfect intermediate course for cybersecurity professionals.

Master cryptographic hash functions, message authentication, and digital signatures. Perfect intermediate course for cybersecurity professionals.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Applied Cryptography Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4.5

(76 ratings)

8,758 already enrolled

Instructors:

English

پښتو, বাংলা, اردو, 3 more

Powered by

Provider Logo
Cryptographic Hash and Integrity Protection

This course includes

8 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Master cryptographic hash functions and their security requirements

  • Understand hash chains and Merkle trees for data integrity

  • Implement message authentication codes (MAC) for secure communication

  • Develop digital signature systems using public-key cryptography

  • Apply cryptographic concepts to blockchain and cryptocurrency security

Skills you'll gain

Cryptographic Hash Functions
Message Authentication Code
Digital Signatures
Blockchain Security
Hash Chain
Merkle Trees
Cryptocurrency
Data Integrity
Public Key Cryptography
Security Protocols

This course includes:

0.9 Hours PreRecorded video

5 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This comprehensive course covers the fundamentals and applications of cryptographic hash functions and integrity protection. Starting with the basics of hash functions and their requirements, the curriculum progresses through hash chains, Merkle trees, and their applications in cryptocurrencies. Students learn about message authentication codes (MAC) based on symmetric keys and digital signatures using asymmetric cryptography. The course combines theoretical concepts with practical implementations, preparing students for real-world cryptographic applications.

Cryptographic Hash Function

Module 1 · 2 Hours to complete

Cryptographic Hash Function Applications

Module 2 · 2 Hours to complete

Message Authentication Code (MAC)

Module 3 · 1 Hours to complete

Digital Signature

Module 4 · 2 Hours to complete

Fee Structure

Instructor

Sang-Yoon Chang
Sang-Yoon Chang

4.8 rating

78 Reviews

54,341 Students

6 Courses

Expert in Computer Security and Assistant Professor at UCCS

Dr. Sang-Yoon Chang is an Assistant Professor in the Computer Science department at the University of Colorado Colorado Springs (UCCS). He specializes in computer security and computer networks, with a particular focus on wireless networks, edge computing, and cyber-physical systems. His research aligns closely with advancements in the Internet of Things (IoT) and aims to enhance the security and efficiency of networked systems. Dr. Chang has a strong academic background, having earned both his Bachelor’s and Ph.D. degrees in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign.In addition to his research, Dr. Chang teaches several courses related to cryptography and network security, including "Asymmetric Cryptography and Key Management" and "Cryptography and Information Theory." His work has garnered attention for its relevance in today's technology landscape, particularly as it pertains to secure communications in increasingly interconnected environments.

Cryptographic Hash and Integrity Protection

This course includes

8 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

4.5 course rating

76 ratings

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.