Course Overview

Although many wonderful cryptography tools have been invented in the past decades, it is not easy to select the correct tool for a problem and use it in the correct manner. This advanced cryptography engineering course will not only teach you what tools are important but also make you a pro in using them.

We will begin with the requirements, setup, and installation of the environment. We will learn about Hash functions, what they are and how to work with them, along with their applications. We will explore the world of Random numbers. Here we will learn about random number generation and the concept of key generation. We will also get a very detailed knowledge of symmetric and asymmetric encryption, how they work and what their real-life applications are. You will also get to learn about MAC, Hash-based MAC, and Cipher Based MAC. Further, we will cover the topics like public key infrastructure and advanced cryptography tools.

By the end of this course, you will have mastered all the concepts in advanced cryptography and its real-life applications. You will get all these concepts to learn in the most practical and hands-on way.

What You Will Learn

  • What we have: systematic overview of the available cryptography tools, including the most recent progress in the area.
  • How to select: guidelines to choose the appropriate cryptography tools for specific scenarios.
  • What are the steps: hands on practice on using cryptography tools to solve real problems step by step.
  • Why this way: detailed explanation on the logic behind the way of applying a cryptography tool.

Program Curriculum

  • Development Environment
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Lab
  • Chapter 1 Quiz

  • Hash Function Definition and Security Features
  • Using Hash Function in Golang
  • Random Oracle
  • SHA3
  • Applications of Hash Functions
  • Hash Function and Blockchain
  • Chapter 2 Lab
  • Chapter 2 Quiz

  • Random Number Basics
  • Random Number Generator
  • Keys in Cryptography
  • Key Generation with Hash
  • Secret Sharing
  • Chapter 3 Lab
  • Chapter 3 Quiz

  • Symmetric Encryption and Block Cipher
  • Key Sizes of Block Encryption
  • Initial Vector and Planning
  • Operation Mode for Block Encryption
  • Key Wrap – Encryption of Key
  • Selection of Operation Mode
  • Chapter 4 Lab
  • Chapter 4 Quiz

  • MAC Basics
  • HMAC: Hash-based MAC
  • CMAC: Cipher-based MAC
  • Chapter 5 Lab
  • Chapter 5 Quiz

  • Asymmetric Encryption Basics
  • Security of Asymmetric Encryption
  • RSA Encryption with OEAP
  • More on RSA Encryption
  • Asymmetric KEM
  • Elliptic Curve Based Asymmetric Encryption
  • Comparison of RSA and EC based Cryptography
  • Chapter 6 Lab
  • Chapter 6 Quiz

  • Digital Signature Basics
  • Digital Signature Schemes
  • Digital Signature as Service
  • Digital Signature: MISC
  • Hash Based Digital Signature
  • Chapter 7 Lab
  • Chapter 7 Quiz

  • Key Exchange Basics
  • DH Key Exchange
  • Man in the middle and Authenticated Key Exchange
  • Case Study - Signal
  • Chapter 8 Lab
  • Chapter 8 Quiz

  • Motivation of PKI
  • PKI Basics
  • PKI Certificate
  • Limitations of PKI
  • PGP - New PKI
  • Chapter 9 Lab
  • Chapter 9 Quiz

  • Overview of MISC Cryptography Tools
  • More Encryption Tools
  • Fancier Digital Signature
  • Chapter 10 Quiz

  • Impacts of Quantum Computer on Cryptography
  • Post Quantum Cryptography Tools
  • Chapter 11 Quiz
Load more modules

Instructor

Lei Xu

Dr. Lei Xu is an assistant professor at the University of Texas Rio Grande Valley. He has more than 10 years experience in cybersecurity research and development. He worked for both industry and academia and has a deep understanding on the challenges an engineer may face when dealing with cryptography tools.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Fastest Way to Level Up Your Cybersecurity Skills

Invest in your future with flexible subscription plans that give you access to the world’s largest online cybersecurity course library. Whether you're exploring cybersecurity courses for beginners or advancing your expertise,
access in-demand courses, practical labs, and CTF challenges designed to support continuous learning.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Build your cybersecurity skills with 900+ bite-sized courses and curated learning paths designed for continuous learning.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 880+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Develop real-world cybersecurity skills through hands-on labs and CTF challenges designed for practical learning.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro, Plus:

  • 1600+ Hands-on lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Hands-on Labs and Challenges added every month

Related Courses

1 of 50