Cryptography: Encryption Schemes and Cyclic Groups
Learn about Authenticated Encryption Scheme and the Cryptographic Cyclic groups in this cryptography free online course.
Take this certificate on your own.
Start now and learn at your own pace.
CertificaciónVer los módulos del curso
This Cryptography free online course Encryption Schemes and Cyclic Groups, highlights another variation of security known as Authenticated Encryption and the various Cryptographic Hardness Assumptions in the context of Cyclic Groups. You will learn about the definition and Implication of Authenticated Encryption Schemes. The notion of how to securely compose a CPA-secure cipher and a secure Message Authentication Scheme will be outlined in the first section of the course.
Next, you will learn about various definitions of Anonymous Key-Exchange Protocol and the underlying idea behind the Diffie-Hellman Key-Exchange Protocol. The generic construction of Key-Exchange Protocols based on one-way trap-door function will also be highlighted in this section. Then, you will be introduced to the concepts of Cyclic Groups; definitions and properties. You will learn about the various Cryptographic Hardness Assumptions in the context of Cyclic Groups; the Diffie-Hellman Assumption, the Computational Diffie-Hellman Assumption and the Decisional Diffie-Hellman Assumption. Thereafter, you will learn about the Diffie-Hellman Key-Exchange Protocol.
Lastly, you will learn about the features of the Prime-Order Cyclic Groups where the Cryptographic Hardness Assumptions are difficult to solve and you will gain insight into Cyclic Groups based on Elliptic Curves. This course is a great starting point for anyone who is looking to pursue a career in Cryptography, especially in the areas of Authenticated Encryptions and Cyclic Groups. It will also be highly relevant to those who want to learn to improve the security of their systems and data. Why wait, start this course today!Inicio Curso Ahora
Authenticated Encryption Schemes
Authenticated Encryption Schemes - Learning Outcomes
Composing CPA Secure Cipher and Secure MAC
Other Approaches for Authenticated Encryption
Key Exchange Protocols
Generic Constructions of Key Exchange Protocol
Authenticated Encryption Schemes - Lesson Summary
Cyclic Groups - Learning Outcomes
Introduction to Cyclic Groups
Cryptographic Hardness Assumptions
Candidate Cyclic Groups
Cyclic Groups based on Elliptic Curves
Discrete Logarithm Assumptions
Cyclic groups - Lesson Summary
Upon successful completion of this course, you should be able to:
- Explain the concept of Authenticated Encryption
- State the implications of Authenticated Encryption
- Describe the approaches for constructing CPA-Secure Ciphers
- Discuss the properties of anonymous key-exchange protocols
- State the categories of the Cryptographic Hardness Assumptions
- Summarise the importance of good Cyclic Groups
- Outline the applications of the Discrete Log Assumption
All Alison courses are free to study. To successfully complete a course you must score 80% or higher in each course assessments. Upon successful completion of a course, you can choose to make your achievement formal by purchasing an official Alison Diploma, Certificate or PDF.
Having an official Alison document is a great way to celebrate and share your success. It is:
- Ideal to include with CVs, job applications and portfolios
- A way to show your ability to learn and achieve high results