English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 56 lectures (11h 12m) | 14.33 GB
Secret-key encryption, one-way hash, public-key cryptography, digital signature, PKI, TLS, cryptocurrency and blockchain
Cryptography is a foundation in cybersecurity. It is the underlying building block of many defense mechanisms, systems, and protocols. Without crypto, we will not be able to safely conduct many things on the Internet, such as web browsing, online banking, working remotely, etc. Without crypto, blockchain and cryptocurrency will not exist.
In this course, we systematically study the basic principles of cryptography. In particular, we focus on the three essential pillars of cryptography, including secret-key encryption, one-way hash function, and public-key cryptography. We study how they work and how they are used in the real-world applications. We also look at the risks they face, and how these risks are mitigated in the real world. Furthermore, we study the common mistakes people make when using crypto algorithms and protocols. We show how these mistakes can be exploited in attacks.
The course emphasizes hands-on learning. For each topic covered, students not only learn the theory, they also get to work on the hands-on exercises developed by the instructor. These exercises are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the widely-adopted textbook written by the instructor. The title of the book is “Computer & Internet Security: A Hands-on Approach”.
What you’ll learn
- Study the basic principles of cryptography, including secret-key encryption, one-way hash function, and public-key cryptography
- Study various crypto applications, including authentication, digital signature, HTTPS, credit card, blockchain, cryptocurrencies, etc.
- Study the Public Key Infrastructure (PKI) and the TLS protocol, which are essential for securing communication on the Internet
- Understand the risks faced by various crypto algorithms and protocols, and how these risks can be mitigated
- Understand the common mistakes in the use of crypto
- Gain hands-on experiences through 8 crypto labs (SEED Labs) developed by the instructor
Table of Contents
Course Overview
1 Topics, Textbooks Labs, and the Instructor
Secret-Key Encryption
2 Introduction
3 Classical Crypto Systems
4 Polyalphabetical Cypher and Enigma
5 DES and AES
6 Encryption Modes
7 Common Mistakes on IV
8 Authenticated Encryption Mode GCM
9 Padding
10 Padding Oracle Attack
11 Summary
One-Way Hash Function
12 Introduction
13 What Is One-Way Hash function
14 The MD and SHA Algorithms
15 Collision Attack
16 Applications
17 MAC and Hash Length Extension Attack
18 Summary
Public-Key Cryptography
19 Introduction
20 Diffie-Hellman Key Exchange
21 Math Background for RSA
22 The RSA Algorithm
23 Public Key Encryption Tools and Performance
24 Padding
25 Digital Signature
26 Programming
27 Applications of Public Key Cryptography
28 Summary
Public-Key Infrastructure
29 Introduction
30 The Man-In-The-Middle Attack
31 Overview of PKI
32 Public Key Certificate
33 Issue Certificates
34 Secure Web Server Using Public Key Certificate
35 How PKI Defeats MITM Attacks
36 Attacks on PKI
37 Summary
Transport Layer Security
38 Introduction
39 Overview of the TLS Protocol
40 The TLS Handshake Protocol
41 Data Transmission
42 TLS Client Program
43 Hostname check
44 TLS Server Program
45 TLS Proxy
46 Summary
Bitcoin and Blockchain
47 Introduction
48 Blockchain
49 Proof-of-Work Consensus (PoW)
50 Bitcoin History
51 Bitcoin Address
52 Bitcoin Transaction
53 Locking and Unlocking Transaction
54 Double Spending
55 Ethereum Blockchain
56 Summary
Resolve the captcha to access the links!