Loading

Alison's New App is now available on iOS and Android! Download Now

Cryptography: Encryption Schemes and Cyclic Groups

Learn about Authenticated Encryption Scheme and the Cryptographic Cyclic groups in this cryptography free online course.

Publisher: NPTEL
In this Cryptography free online course, you will learn about the Authenticated Encryption Scheme and the various Cryptographic Hardness Assumptions in the context of Cyclic Groups. You will also learn about the generic construction of anonymous Key-exchange protocols. This course will benefit anyone who is looking to pursue a career in Cryptography or those who want to improve the security of their computer systems and data.
Cryptography: Encryption Schemes and Cyclic Groups
  • Duration

    5-6 Hours
  • Students

    190
  • Accreditation

    CPD

Description

Modules

Outcome

Certification

View course modules

Description

This Cryptography free online course Encryption Schemes and Cyclic Groups, highlights another variation of security known as Authenticated Encryption and the various Cryptographic Hardness Assumptions in the context of Cyclic Groups. You will learn about the definition and Implication of Authenticated Encryption Schemes. The notion of how to securely compose a CPA-secure cipher and a secure Message Authentication Scheme will be outlined in the first section of the course.

Next, you will learn about various definitions of Anonymous Key-Exchange Protocol and the underlying idea behind the Diffie-Hellman Key-Exchange Protocol. The generic construction of Key-Exchange Protocols based on one-way trap-door function will also be highlighted in this section. Then, you will be introduced to the concepts of Cyclic Groups; definitions and properties. You will learn about the various Cryptographic Hardness Assumptions in the context of Cyclic Groups; the Diffie-Hellman Assumption, the Computational Diffie-Hellman Assumption and the Decisional Diffie-Hellman Assumption. Thereafter, you will learn about the Diffie-Hellman Key-Exchange Protocol.

Lastly, you will learn about the features of the Prime-Order Cyclic Groups where the Cryptographic Hardness Assumptions are difficult to solve and you will gain insight into Cyclic Groups based on Elliptic Curves. This course is a great starting point for anyone who is looking to pursue a career in Cryptography, especially in the areas of Authenticated Encryptions and Cyclic Groups. It will also be highly relevant to those who want to learn to improve the security of their systems and data. Why wait, start this course today!

Start Course Now

Careers