Asymmetric Cryptography and Key Management

Por: Coursera . en: , ,

  • Asymmetric Cryptography Overview
    • This module reviews the principles and requirements of asymmetric cryptography, which uses a pair of keys - with one party using a public key and the other using the corresponding private key or vice versa - in contrast to symmetric cryptography using a shared secret key.
  • RSA Algorithm
    • This module describes the RSA cipher algorithm from the key setup and the encryption/decryption operations to the Prime Factorization problem and the RSA security.
  • Diffie-Hellman Key Exchange
    • Diffie-Hellman Key Exchange is an asymmetric cryptographic protocol for key exchange and its security is based on the computational hardness of solving a discrete logarithm problem. This module explains the discrete logarithm problem and describes the Diffie-Hellman Key Exchange protocol and its security issues, for example, against a man-in-the-middle attack.
  • Key Distribution and Management
    • Cryptographic schemes build on cryptographic key, which provides asymmetry between the legitimate parties and the attacker. This module describes key distribution approaches and focuses on the approach based on public-key certificates/authority and public-key infrastructure that can support large number of parties, e.g., Internet.