To support our site, Class Central may be compensated by some course providers.

Cryptographic Hash and Integrity Protection

University of Colorado System via Coursera

students interested
  • Provider Coursera
  • Subject Cybersecurity
  • $ Cost Free Online Course (Audit)
  • Session In progress
  • Language English
  • Certificate Paid Certificate Available
  • Effort 2-4 hours a week
  • Start Date
  • Duration 4 weeks long

Taken this course? Share your experience with other students. Write review

Overview

Sign up to Coursera courses for free Learn how

Welcome to Cryptographic Hash and Integrity Protection!

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.

This course is a part of the Applied Cryptography specialization.

Taught by

Sang-Yoon Chang

Help Center

Most commonly asked questions about Coursera Coursera

Reviews for Coursera's Cryptographic Hash and Integrity Protection
Based on 0 reviews

  • 5 star 0%
  • 4 star 0%
  • 3 star 0%
  • 2 star 0%
  • 1 star 0%

Did you take this course? Share your experience with other students.

Write a review

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.