This course is part of Applied Cryptography Specialization.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Introduction to Applied Cryptography Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.6
(254 ratings)
12,757 already enrolled
Instructors:
English
پښتو, বাংলা, اردو, 4 more
What you'll learn
Understand principles and requirements of asymmetric cryptography
Master RSA algorithm implementation and security considerations
Implement Diffie-Hellman key exchange protocol
Design secure key distribution systems
Develop expertise in public-key infrastructure (PKI)
Skills you'll gain
This course includes:
1.4 Hours PreRecorded video
6 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This comprehensive course explores asymmetric cryptography and key management systems. Students learn the principles of public-key cryptography, focusing on RSA algorithm implementation and Diffie-Hellman key exchange protocol. The curriculum covers mathematical foundations including prime factorization and discrete logarithms, security considerations, and practical applications in key distribution through public-key infrastructure (PKI). The course combines theoretical concepts with hands-on assignments.
Asymmetric Cryptography Overview
Module 1 · 2 Hours to complete
RSA Algorithm
Module 2 · 2 Hours to complete
Diffie-Hellman Key Exchange
Module 3 · 2 Hours to complete
Key Distribution and Management
Module 4 · 1 Hours to complete
Fee Structure
Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Applied Cryptography Specialization
Instructor
Expert in Computer Security and Assistant Professor at UCCS
Dr. Sang-Yoon Chang is an Assistant Professor in the Computer Science department at the University of Colorado Colorado Springs (UCCS). He specializes in computer security and computer networks, with a particular focus on wireless networks, edge computing, and cyber-physical systems. His research aligns closely with advancements in the Internet of Things (IoT) and aims to enhance the security and efficiency of networked systems. Dr. Chang has a strong academic background, having earned both his Bachelor’s and Ph.D. degrees in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign.In addition to his research, Dr. Chang teaches several courses related to cryptography and network security, including "Asymmetric Cryptography and Key Management" and "Cryptography and Information Theory." His work has garnered attention for its relevance in today's technology landscape, particularly as it pertains to secure communications in increasingly interconnected environments.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.