Cryptography: Encryption Schemes and Cyclic Groups
Learn about Authenticated Encryption Scheme and the Cryptographic Cyclic groups in this cryptography free online course.
Description
This Cryptography free online course Encryption Schemes and Cyclic Groups, highlights another variation of security known as Authenticated Encryption and the various Cryptographic Hardness Assumptions in the context of Cyclic Groups. You will learn about the definition and Implication of Authenticated Encryption Schemes. The notion of how to securely compose a CPA-secure cipher and a secure Message Authentication Scheme will be outlined in the first section of the course.
Next, you will learn about various definitions of Anonymous Key-Exchange Protocol and the underlying idea behind the Diffie-Hellman Key-Exchange Protocol. The generic construction of Key-Exchange Protocols based on one-way trap-door function will also be highlighted in this section. Then, you will be introduced to the concepts of Cyclic Groups; definitions and properties. You will learn about the various Cryptographic Hardness Assumptions in the context of Cyclic Groups; the Diffie-Hellman Assumption, the Computational Diffie-Hellman Assumption and the Decisional Diffie-Hellman Assumption. Thereafter, you will learn about the Diffie-Hellman Key-Exchange Protocol.
Lastly, you will learn about the features of the Prime-Order Cyclic Groups where the Cryptographic Hardness Assumptions are difficult to solve and you will gain insight into Cyclic Groups based on Elliptic Curves. This course is a great starting point for anyone who is looking to pursue a career in Cryptography, especially in the areas of Authenticated Encryptions and Cyclic Groups. It will also be highly relevant to those who want to learn to improve the security of their systems and data. Why wait, start this course today!
Start Course NowModules
Authenticated Encryption Schemes
-
Authenticated Encryption Schemes - Learning Outcomes
-
Authenticated Encryption
-
Composing CPA Secure Cipher and Secure MAC
-
Other Approaches for Authenticated Encryption
-
Key Exchange Protocols
-
Generic Constructions of Key Exchange Protocol
-
Authenticated Encryption Schemes - Lesson Summary
Cyclic Groups
-
Cyclic Groups - Learning Outcomes
-
Introduction to Cyclic Groups
-
Cryptographic Hardness Assumptions
-
Candidate Cyclic Groups
-
Cyclic Groups based on Elliptic Curves
-
Discrete Logarithm Assumptions
-
Public-Key Cryptosystems
-
Cyclic groups - Lesson Summary
Course assessment
Learning Outcomes
Upon successful completion of this course, you should be able to:
- Explain the concept of Authenticated Encryption
- State the implications of Authenticated Encryption
- Describe the approaches for constructing CPA-Secure Ciphers
- Discuss the properties of anonymous key-exchange protocols
- State the categories of the Cryptographic Hardness Assumptions
- Summarise the importance of good Cyclic Groups
- Outline the applications of the Discrete Log Assumption
Certification
All Alison courses are free to study. To successfully complete a course you must score 80% or higher in each course assessments. Upon successful completion of a course, you can choose to make your achievement formal by purchasing an official Alison Diploma, Certificate or PDF.
Having an official Alison document is a great way to celebrate and share your success. It is:
- Ideal to include with CVs, job applications and portfolios
- A way to show your ability to learn and achieve high results