-
Course
- Security
Cryptography Fundamentals for Developers and Security Professionals
Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted.
What you'll learn
The Java and .NET frameworks contain all the algorithms you need to keep your users' data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL, keep your users secure online. But to use these tools correctly, and to avoid mistakes of the past, you must understand how cryptography works. Learn the math behind encryption and digital signatures. Study examples of how it has been misused, and explore the possibilities that cryptography enables in digital currency and collaboration.
Table of contents
- Introduction | 35s
- Block Ciphers | 2m 9s
- Confusion and Key Schedules | 1m 13s
- Diffusion and Cipher Block Chaining | 1m 44s
- Initialization Vectors | 1m 2s
- DES | 1m 11s
- AES | 2m 36s
- Modern Cryptanalysis | 2m 7s
- Compression and Error Correction | 3m 58s
- Public and Private Keys | 2m 59s
- Inverse Exponents Example | 2m 27s
- Finding Inverse Exponents | 4m 45s
- The RSA Algorithm | 2m 21s
- Patterns in RSA | 2m 32s
- Discrete Logarithm Problem | 5m 32s
- Elliptic Curve | 3m 23s
- Digital Signatures | 2m 30s
- Hashing Algorithms | 2m 21s
- Birthday Attack | 4m 4s
- Trust | 2m 19s
- Summary | 1m 18s
About the author
Mathematician and software developer, Michael L Perry applies formal proof to creating reliable software. He has developed a method starting from the works of the greats (Meyer, Rumbaugh, Knuth), and embodied it in his open-source frameworks (Update Controls and Correspondence).
More Courses by Michael