Cryptographic Hash and Integrity Protection



Cryptographic Hash and Integrity Protection

Cryptographic Hash and Integrity Protection


Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation …

Duration Course 4 of 4 in the
Start your Free Trial

Self paced

6,200 already enrolled

4.7stars Rating out of 5 (69 ratings in Coursera)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.