Public-Key Cryptography

  • 13 Videos | 50m 56s
  • Includes Assessment
Likes 1 Likes 1
Learn how public-key cryptography works and how it can be applied to guarantee confidentiality, integrity, and to authenticate communications

WHAT YOU WILL LEARN

  • Lay out what you will learn in the course
    Understand the context behind public-key cryptography
    Know the history behind public-key cryptography
    Understand the number theoretic foundations for public-key cryptography
    Understand computational complexity as a foundation for public-key cryptography
    Know how to establish a key
    Understand the RSA public-key cryptosystem
  • Know how to use the ElGamal public-key cryptosystem
    Know what it means to be a secure public-key cryptosystem
    Understand digital signatures
    Understand cryptography based on elliptic curves
    Know the homomorphic properties of public-key cryptosystems
    Understand what an adversary might do to defeat the security of your system

IN THIS COURSE

  • Playable
    1. 
    Public-Key Cryptography Video 1
    3m 30s
    UP NEXT
  • Playable
    2. 
    Public-Key Cryptography Video 2
    2m 49s
  • Locked
    3. 
    Public-Key Cryptography Video 3
    4m 11s
  • Locked
    4. 
    Public-Key Cryptography Video 4
    4m 58s
  • Locked
    5. 
    Public-Key Cryptography Video 5
    2m 59s
  • Locked
    6. 
    Public-Key Cryptography Video 6
    3m 34s
  • Locked
    7. 
    Public-Key Cryptography Video 7
    4m 5s
  • Locked
    8. 
    Public-Key Cryptography Video 8
    4m 57s
  • Locked
    9. 
    Public-Key Cryptography Video 9
    3m 50s
  • Locked
    10. 
    Public-Key Cryptography Video 10
    3m 45s
  • Locked
    11. 
    Public-Key Cryptography Video 11
    2m 57s
  • Locked
    12. 
    Public-Key Cryptography Video 12
    3m 14s
  • Locked
    13. 
    Public-Key Cryptography Video 13
    6m 8s