Asymmetric Cryptography and Key Management



Asymmetric Cryptography and Key Management

Asymmetric Cryptography and Key Management


Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the …

Duration Approx. 9 hours to complete
Start your Free Trial

Self paced

9,371 already enrolled

4.7stars Rating out of 5 (237 ratings in Coursera)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.