We may earn an affiliate commission when you visit our partners.
Course image
Sang-Yoon Chang

Welcome to Cryptographic Hash and Integrity Protection!

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.

This course is a part of the Applied Cryptography specialization.

Enroll now

What's inside

Syllabus

Cryptographic Hash Function
Cryptographic hash function is a fundamental building block in modern cryptography and is used for digital signature, message authentication, anomaly detection, pseudo-random number generator, password security, and so on. This module define cryptographic hash functions and contrast it with ordinary hash functions. It also describes the iterative structure for hash implementation to support the hash requirements.
Read more
Cryptographic Hash Function Applications
Building on the previous module defining cryptographic hash functions, this module review its uses and applications. We will first describe hash chain, which chains multiple hash functions in sequence, and apply hash chain for generating one-time passwords using a scheme called S/Key. Then, we will use hash functions to construct a binary tree and describe hash tree, also known as Merkle tree. Lastly, we will review the applications of hash function and hash tree for decentralized digital currency in the forms of cryptocurrency or bitcoins.
Message Authentication Code (MAC)
Message authentication is to protect the message integrity and to perform sender authentication. This module describes message authentication code (MAC) which is based on symmetric keys. It contrasts MAC with hash functions or general encryption/decryption techniques and quantify the brute force attack difficulty for MAC and discuss the security requirements for MAC. The module also reviews two MAC implementations in Data Authentication Algorithm (DAA) and Cipher-Based MAC (CMAC), which are based on the use of block ciphers.
Digital Signature
Like physical signatures in paper transactions, digital signature provides sender authentication and non-repudiation. This module describes how to use public-key pair to ensure the source of the packet. Then, it describes the purpose of digital signatures and the corresponding requirements. Lastly, we review a digital signature construction, which is the basis for many digital signature implementations such as RSA signature and Digital Signature Standard (DSS).

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores cryptographic hash functions and their applications, providing a strong foundation for students interested in cryptography
Taught by Sang-Yoon Chang, a renowned expert in cryptography, providing students with access to cutting-edge knowledge and industry insights
Covers message authentication code (MAC) and digital signatures, essential concepts for ensuring data integrity and authenticity
Provides a comprehensive overview of cryptographic hash functions, including their applications in hash chain, hash tree, and digital currency
Requires no prerequisites, making it accessible to students with varying backgrounds

Save this course

Save Cryptographic Hash and Integrity Protection to your list so you can find it easily later:
Save

Reviews summary

Cryptographic hash course

Learners say this cryptography course is great with clear and helpful explanations. However, some learners express frustration with the peer grading requirement.
Professor Sang-Yoon Chang is clear and helpful.
"Great theory. Professor is also super clear in his explanations."
"Very helpful course to learn Cryptography..! and Sang-Yoon Chang is a nice teacher."
Multiple learners are frustrated with the peer grading requirement.
"This is a very solid course but the "peer grading" requirement needs to be changed."
"The course clearly does not have enough traffic to justify every student doing 3 peer reviews."
"The requirement should be definitely be reduced - at least to 2 and possibly all the way to one."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cryptographic Hash and Integrity Protection with these activities:
Refresh Mathematical Concepts
A strong foundation in mathematical concepts is essential for fully understanding cryptographic hash functions.
Browse courses on Number Theory
Show steps
  • Review key mathematical concepts.
  • Work through practice exercises.
Review Basic Cryptography Concepts
Refreshing your understanding of basic cryptography can provide a stronger foundation for learning about cryptographic hashing techniques.
Browse courses on Cryptography
Show steps
  • Review notes or textbooks on basic cryptography.
  • Complete practice problems.
Review Textbook on Applied Cryptography
Reviewing this comprehensive textbook can provide a deeper understanding of the concepts and techniques covered in the course.
Show steps
  • Obtain a copy of the recommended textbook.
  • Review the introduction and key concepts.
  • Read the relevant chapters for each module.
  • Work through the provided exercises.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Organize Course Resources
Organizing your course materials will improve your ability to locate and review important information later.
Show steps
  • Create a system to organize lecture notes.
  • Establish a digital or physical folder structure.
  • File materials according to the course outline.
Form Study Groups for Quiz Review
Study groups provide a supportive environment to learn from and assist your peers, which helps you improve your own comprehension.
Browse courses on Digital Signatures
Show steps
  • Identify a group of peers with similar learning goals.
  • Establish a regular meeting schedule.
  • Prepare for each session by reviewing the assigned material.
  • Actively participate in discussions.
  • Take turns summarizing key concepts.
Produce Repeated Solutions
Practice and repetition are key components for solidifying an understanding of cryptographic hash functions.
Browse courses on Cryptology
Show steps
  • Review the provided lecture notes on cryptographic hashing.
  • Work through the provided practice problems.
  • Complete timed assessments to test your retention.
Maintain a Course Summary
Creating a summary of the course materials encourages active engagement with the content, leading to more effective learning.
Show steps
  • Review the lecture notes and materials.
  • Identify key concepts and organize them in a logical manner.
  • Write a concise summary.
  • Review and revise the summary.
Explore Online Resources for Hash Tree
Exploring online tutorials can supplement your understanding of hash trees and related concepts, enriching your learning experience.
Show steps
  • Search for online tutorials on hash trees.
  • Select a well-regarded tutorial.
  • Follow the tutorial step-by-step.
  • Experiment with different hash tree implementations.
Present a Practical Implementation of Message Authentication
Implementing and presenting a practical use case of message authentication will sharpen your understanding of the concepts and their real-world applications.
Show steps
  • Select a suitable practical application.
  • Design and implement a message authentication system.
  • Prepare a presentation showcasing your system.
  • Present your system and demonstrate its functionality.
  • Optional: Submit a project report.

Career center

Learners who complete Cryptographic Hash and Integrity Protection will develop knowledge and skills that may be useful to these careers:
Data Protection Officer
Data Protection Officers are responsible for ensuring that their organizations comply with data privacy regulations, such as the General Data Protection Regulation (GDPR) in Europe. Cryptographic hashes and integrity protection are essential for data protection because they help to ensure that data is accurate, complete, and unmodified. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Data Protection Officer.
Information Security Analyst
Information Security Analysts are responsible for protecting their organizations from cyber attacks and other security threats. Cryptographic hashes and integrity protection are essential for information security because they help to ensure that data is not tampered with or compromised. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as an Information Security Analyst.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining network security systems. Cryptographic hashes and integrity protection are essential for network security because they help to protect data from unauthorized access and modification. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Network Security Engineer.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems. Cryptographic hashes and integrity protection are essential for security because they help to ensure that data is not tampered with or compromised. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Security Engineer.
Security Researcher
Security Researchers are responsible for discovering and exploiting vulnerabilities in security systems. Cryptographic hashes and integrity protection are essential for security research because they help to identify and mitigate vulnerabilities. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Security Researcher.
Software Engineer
Software Engineers are responsible for designing, developing, and maintaining software systems. Cryptographic hashes and integrity protection are essential for software development because they help to ensure that software is secure and reliable. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Software Engineer.
Database Administrator
Database Administrators are responsible for managing and maintaining databases. Cryptographic hashes and integrity protection are essential for database management because they help to ensure that data is accurate, complete, and unmodified. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Database Administrator.
Cryptographer
Cryptographers are responsible for developing and implementing cryptographic algorithms and systems. Cryptographic hashes and integrity protection are essential for cryptography because they help to ensure that data is secure and confidential. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Cryptographer.
Auditor
Auditors are responsible for examining and evaluating financial records and systems. Cryptographic hashes and integrity protection are essential for auditing because they help to ensure that financial data is accurate, complete, and unmodified. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as an Auditor.
Forensic Analyst
Forensic Analysts are responsible for investigating and analyzing computer systems and data for evidence of criminal activity. Cryptographic hashes and integrity protection are essential for forensic analysis because they help to ensure that digital evidence is not tampered with or compromised. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Forensic Analyst.
Pentester
Pentesters are responsible for testing the security of computer systems and networks. Cryptographic hashes and integrity protection are essential for penetration testing because they help to identify and mitigate vulnerabilities. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Pentester.
Risk Analyst
Risk Analysts are responsible for identifying and assessing risks to an organization's assets and operations. Cryptographic hashes and integrity protection are essential for risk analysis because they help to ensure that data is accurate, complete, and unmodified. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Risk Analyst.
Security Consultant
Security Consultants are responsible for providing security advice and guidance to organizations. Cryptographic hashes and integrity protection are essential for security consulting because they help to ensure that data is secure and confidential. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Security Consultant.
Technical Writer
Technical Writers are responsible for writing and editing technical documentation. Cryptographic hashes and integrity protection are essential for technical writing because they help to ensure that documentation is accurate, complete, and unmodified. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as a Technical Writer.
Analyst
Analysts are responsible for gathering and analyzing data to make informed decisions. Cryptographic hashes and integrity protection are essential for data analysis because they help to ensure that data is accurate, complete, and unmodified. This course will provide you with a strong foundation in the principles of cryptographic hashes and integrity protection, which will be essential for your success as an Analyst.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cryptographic Hash and Integrity Protection.
Provides a comprehensive overview of cryptographic hash functions, message authentication codes, and digital signatures, all of which are covered in the course. It valuable reference for anyone who wants to learn more about these topics.
Provides a comprehensive overview of cryptography and network security, including chapters on cryptographic hash functions, message authentication codes, and digital signatures. It good choice for students who want to learn more about these topics in a more general context.
Provides a fascinating and accessible overview of the history of cryptography, from ancient times to the present day. It good choice for students who want to learn more about the historical context of cryptography.
Provides a comprehensive overview of modern cryptography, including chapters on cryptographic hash functions, message authentication codes, and digital signatures. It good choice for students who want to learn more about these topics in a more theoretical context.
Provides a practical guide to cryptography for developers, with a focus on implementing cryptographic algorithms in Python. It good choice for students who want to learn more about the practical aspects of cryptography.
Provides a comprehensive overview of Bitcoin and blockchain technology, including chapters on cryptographic hash functions. It good choice for students who want to learn more about the applications of cryptographic hash functions in the real world.
Provides a fascinating and accessible overview of the history and practice of deception, including chapters on cryptography. It good choice for students who want to learn more about the social and ethical implications of cryptography.
Provides a fascinating and accessible overview of the history of cryptography, from ancient times to the present day. It good choice for students who want to learn more about the historical context of cryptography.
Provides a fascinating and accessible overview of the history and philosophy of information, including chapters on cryptography. It good choice for students who want to learn more about the broader context of cryptography.
Provides a fascinating and accessible overview of the history of the Enigma machine, which was used by Nazi Germany to encrypt messages during World War II. It good choice for students who want to learn more about the historical context of cryptography.
Provides a fascinating and accessible overview of the world of intelligence, espionage, and cyberwar, including chapters on cryptography. It good choice for students who want to learn more about the practical applications of cryptography.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cryptographic Hash and Integrity Protection.
409: Cryptograp
Most relevant
Unlocking Information Security I: From Cryptography to...
Most relevant
Mathematical Foundations for Cryptography
Most relevant
Classical Cryptosystems and Core Concepts
Most relevant
Symmetric Cryptography
Most relevant
Blockchain and Cryptography Overview
Most relevant
Cyber Attack Countermeasures
Most relevant
Asymmetric Cryptography and Key Management
Most relevant
Cryptography: Boolean functions and related problems
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser