RiseUpp Logo
Educator Logo

Asymmetric Cryptography and Key Management

This course is part of Applied Cryptography Specialization.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Introduction to Applied Cryptography Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4.6

(254 ratings)

12,757 already enrolled

Instructors:

English

پښتو, বাংলা, اردو, 4 more

Powered by

Provider Logo
Asymmetric Cryptography and Key Management

This course includes

8 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Understand principles and requirements of asymmetric cryptography

  • Master RSA algorithm implementation and security considerations

  • Implement Diffie-Hellman key exchange protocol

  • Design secure key distribution systems

  • Develop expertise in public-key infrastructure (PKI)

Skills you'll gain

RSA Algorithm
Public Key Cryptography
Diffie-Hellman Exchange
Key Management
Digital Certificates
PKI
Asymmetric Encryption
Discrete Logarithms
Prime Factorization
Cryptographic Security

This course includes:

1.4 Hours PreRecorded video

6 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This comprehensive course explores asymmetric cryptography and key management systems. Students learn the principles of public-key cryptography, focusing on RSA algorithm implementation and Diffie-Hellman key exchange protocol. The curriculum covers mathematical foundations including prime factorization and discrete logarithms, security considerations, and practical applications in key distribution through public-key infrastructure (PKI). The course combines theoretical concepts with hands-on assignments.

Asymmetric Cryptography Overview

Module 1 · 2 Hours to complete

RSA Algorithm

Module 2 · 2 Hours to complete

Diffie-Hellman Key Exchange

Module 3 · 2 Hours to complete

Key Distribution and Management

Module 4 · 1 Hours to complete

Fee Structure

Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Applied Cryptography Specialization

Instructor

Sang-Yoon Chang
Sang-Yoon Chang

4.8 rating

78 Reviews

54,341 Students

6 Courses

Expert in Computer Security and Assistant Professor at UCCS

Dr. Sang-Yoon Chang is an Assistant Professor in the Computer Science department at the University of Colorado Colorado Springs (UCCS). He specializes in computer security and computer networks, with a particular focus on wireless networks, edge computing, and cyber-physical systems. His research aligns closely with advancements in the Internet of Things (IoT) and aims to enhance the security and efficiency of networked systems. Dr. Chang has a strong academic background, having earned both his Bachelor’s and Ph.D. degrees in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign.In addition to his research, Dr. Chang teaches several courses related to cryptography and network security, including "Asymmetric Cryptography and Key Management" and "Cryptography and Information Theory." His work has garnered attention for its relevance in today's technology landscape, particularly as it pertains to secure communications in increasingly interconnected environments.

Asymmetric Cryptography and Key Management

This course includes

8 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.