Chevron Left
Вернуться к Cryptographic Hash and Integrity Protection

Cryptographic Hash and Integrity Protection, University of Colorado System

4.5
Оценки: 16
Рецензии: 2

Об этом курсе

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....
Фильтр по:

Рецензии: 2

автор: Mohamed Tawfik

Jun 19, 2018

Excellent course

автор: CHITTILLA VENKATA VISWANATH

Jan 18, 2018

Great course