Chevron Left
Volver a Asymmetric Cryptography and Key Management

Opiniones y comentarios de aprendices correspondientes a Asymmetric Cryptography and Key Management por parte de Sistema Universitario de Colorado

242 calificaciones

Acerca del Curso

Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol and learn how and why they work to secure communications/access. Lastly, we will discuss the key distribution and management for both symmetric keys and public keys and describe the important concepts in public-key distribution such as public-key authority, digital certificate, and public-key infrastructure. This course also describes some mathematical concepts, e.g., prime factorization and discrete logarithm, which become the bases for the security of asymmetric primitives, and working knowledge of discrete mathematics will be helpful for taking this course; the Symmetric Cryptography course (recommended to be taken before this course) also discusses modulo arithmetic. This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization....

Principales reseñas


1 de jun. de 2021

Very good intro, particularly talking about Key Management, an usually overlooked aspect of Crypto. Professor is also super clear in his explanations.

Recommended :)


25 de sep. de 2020

Good course to learn Asymmetric Cryptography really helped me a lot to learn , suggest all to take this specialization course to build carrier in cryptography.

Filtrar por:

1 - 25 de 30 revisiones para Asymmetric Cryptography and Key Management

por Frode

14 de ene. de 2018

por Manuel A D R

27 de jul. de 2019


16 de ene. de 2018

por Anton P

25 de ene. de 2018

por Dirk D S

3 de ago. de 2019

por Marcus D

16 de dic. de 2020

por Sebastian C

2 de jun. de 2021

por Shubham T

26 de sep. de 2020

por Liufeng S

21 de mar. de 2021

por Aryanadi I C

4 de dic. de 2021

por Hien D Q

22 de ago. de 2020

por Лопатин М С

26 de may. de 2020

por Богдан Х М

2 de jun. de 2020

por Madhusudan J P

17 de mar. de 2020

por venkat

15 de sep. de 2020

por Devarakonda S

12 de mar. de 2021

por Aswani K C

11 de ago. de 2020

por Скоков Н С

26 de may. de 2020

por Renate K

13 de feb. de 2020

por Iván S M

18 de oct. de 2020

por Alejandro S

13 de jul. de 2020

por Luis V

4 de dic. de 2020

por Praneeth C

12 de may. de 2020

por Mr.Arif M A

19 de may. de 2020

por 321810403034 g

20 de ago. de 2021