Chevron Left
Back to Asymmetric Cryptography and Key Management

Learner Reviews & Feedback for Asymmetric Cryptography and Key Management by University of Colorado System

4.7
stars
238 ratings

About the Course

Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol and learn how and why they work to secure communications/access. Lastly, we will discuss the key distribution and management for both symmetric keys and public keys and describe the important concepts in public-key distribution such as public-key authority, digital certificate, and public-key infrastructure. This course also describes some mathematical concepts, e.g., prime factorization and discrete logarithm, which become the bases for the security of asymmetric primitives, and working knowledge of discrete mathematics will be helpful for taking this course; the Symmetric Cryptography course (recommended to be taken before this course) also discusses modulo arithmetic. This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization....

Top reviews

SC

Jun 1, 2021

Very good intro, particularly talking about Key Management, an usually overlooked aspect of Crypto. Professor is also super clear in his explanations.

Recommended :)

ST

Sep 25, 2020

Good course to learn Asymmetric Cryptography really helped me a lot to learn , suggest all to take this specialization course to build carrier in cryptography.

Filter by:

1 - 25 of 30 Reviews for Asymmetric Cryptography and Key Management

By Frode

Jan 14, 2018

By Manuel A D R

Jul 27, 2019

By CHITTILLA V V

Jan 16, 2018

By Anton P

Jan 25, 2018

By Dirk D S

Aug 3, 2019

By Marcus D

Dec 16, 2020

By Sebastian C

Jun 2, 2021

By Shubham T

Sep 26, 2020

By Liufeng S

Mar 21, 2021

By Aryanadi I C

Dec 4, 2021

By Hien D Q

Aug 22, 2020

By Лопатин М С

May 26, 2020

By Богдан Х М

Jun 2, 2020

By Madhusudan J P

Mar 17, 2020

By venkat

Sep 15, 2020

By Devarakonda S

Mar 12, 2021

By Aswani K C

Aug 11, 2020

By Скоков Н С

May 26, 2020

By Renate K

Feb 13, 2020

By Iván S M

Oct 18, 2020

By Alejandro S

Jul 13, 2020

By Luis V

Dec 4, 2020

By Praneeth C

May 12, 2020

By Mr.Arif M A

May 19, 2020

By 321810403034 g

Aug 20, 2021