Course Overview

Although many wonderful cryptography tools have been invented in the past decades, it is not easy to select the correct tool for a problem and use it in the correct manner. This advanced cryptography engineering course will not only teach you what tools are important but also make you a pro in using them. 

We will begin with the requirements, setup, and installation of the environment. We will learn about Hash functions, what they are and how to work with them, along with their applications. We will explore the world of Random numbers. Here we will learn about random number generation and the concept of key generation. We will also get a very detailed knowledge of symmetric and asymmetric encryption, how they work and what their real-life applications are. You will also get to learn about MAC, Hash-based MAC, and Cipher Based MAC. Further, we will cover the topics like public key infrastructure and advanced cryptography tools. 

By the end of this course, you will have mastered all the concepts in advanced cryptography and its real-life applications. You will get all these concepts to learn in the most practical and hands-on way.  

What You Will Learn

  • What we have: systematic overview of the available cryptography tools
  • including the most recent progress in the area.
  • How to select: guidelines to choose the appropriate cryptography tools for specific scenarios.
  • What are the steps: hands on practice on using cryptography tools to solve real problems step by step.
  • Why this way: detailed explanation on the logic behind the way of applying a cryptography tool.

Program Curriculum

  • Development Environment
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Lab
  • Chapter 1 Quiz

  • Hash Function Definition and Security Features
  • Using Hash Function in Golang
  • Random Oracle
  • SHA3
  • Applications of Hash Functions
  • Hash Function and Blockchain
  • Chapter 2 Lab
  • Chapter 2: Quiz

  • Random Number Basics
  • Random Number Generator
  • Keys in Cryptography
  • Key Generation with Hash
  • Secret Sharing
  • Chapter 3 Lab
  • Chapter 3: Quiz

  • Symmetric Encryption and Block Cipher
  • Key Sizes of Block Encryption
  • Initial Vector and Planning
  • Operation Mode for Block Encryption
  • Key Wrap – Encryption of Key
  • Selection of Operation Mode
  • Chapter 4 Lab
  • Chapter 4: Quiz

  • MAC Basics
  • HMAC: Hash-based MAC
  • CMAC: Cipher-based MAC
  • Chapter 5 Lab
  • Chapter 5: Quiz

  • Asymmetric Encryption Basics
  • Security of Asymmetric Encryption
  • RSA Encryption with OEAP
  • More on RSA Encryption
  • Asymmetric KEM
  • Elliptic Curve Based Asymmetric Encryption
  • Comparison of RSA and EC based Cryptography
  • Chapter 6 Lab
  • Chapter 6: Quiz

  • Digital Signature Basics
  • Digital Signature Schemes
  • Digital Signature as Service
  • Digital Signature: MISC
  • Hash Based Digital Signature
  • Chapter 7 Lab
  • Chapter 7: Quiz

  • Key Exchange Basics
  • DH Key Exchange
  • Man in the middle and Authenticated Key Exchange
  • Case Study - Signal
  • Chapter 8 Lab
  • Chapter 8 :Quiz

  • Motivation of PKI
  • PKI Basics
  • PKI Certificate
  • Limitations of PKI
  • PGP - New PKI
  • Chapter 9 Lab
  • Chapter 9: Quiz

  • Overview of MISC Cryptography Tools
  • More Encryption Tools
  • Fancier Digital Signature
  • Chapter 10: Quiz

  • Impacts of Quantum Computer on Cryptography
  • Post Quantum Cryptography Tools
  • Chapter 11: Quiz
Load more modules

Instructor

Lei Xu

Dr. Lei Xu is an assistant professor at the University of Texas Rio Grande Valley. He has more than 10 years experience in cybersecurity research and development. He worked for both industry and academia and has a deep understanding on the challenges an engineer may face when dealing with cryptography tools.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8