Cryptography and Hashing Fundamentals in Python and Java by Holczer Balazs Udemy

Download: Cryptography and Hashing Fundamentals in Python and Java by Holczer Balazs

Cryptography and Hashing Fundamentals in Python and Java is the course offered by udemy for all those who want to know more about this topic.

Private and Public Key Cryptosystems, DES, AES, Cryptoanalysis, RSA, Elliptic Curve Cryptography and Hashing

Surely some are looking for a free course on this subject; However, we can assure you that the most important teachers in the field have rated this udemy course as one of the best for how concrete and explanatory it is.

Click here if you want to see more courses on: IT & Software

Get Udemy Course

The course professor Holczer Balazs

The Cryptography and Hashing Fundamentals in Python and Java course is taught by Holczer Balazs. For those who do not know, this author is one of the best trained on this subject. He has lectured many times, taught at major institutes, and enjoys a high reputation from his colleagues.

Learn more about Holczer Balazs:

My name is Balazs Holczer. I am from Budapest, Hungary. I am qualified as a physicist. At the moment I am working as a simulation engineer at a multinational company. I have been interested in algorithms and data structures and its implementations especially in Java since university. Later on I got acquainted with machine learning techniques, artificial intelligence, numerical methods and recipes such as solving differential equations, linear algebra, interpolation and extrapolation. These things may prove to be very very important in several fields: software engineering, research and development or investment banking. I have a special addiction to quantitative models such as the Black-Scholes model, or the Merton-model.

Cryptography and Hashing Fundamentals in Python and Java

Description about Cryptography and Hashing Fundamentals in Python and Java

In this course you will learn about cryptography and hashing in Python and Java as well. You will understand most of the private key (symmetric) and pubic key (asymmetric) cryptosystems on a step by step basis. You can learn about the theory as well as the implementation for every cryptographic algorithm – and how to crack these systems (so what are the weaknesses). Chapter 1 – Cryptography Fundamentals what is the aim of cryptography? private key and public key cryptosystems Chapter 2 – Caesar Cipher Caesar cipher theory and implementation how to crack Caesar cipher frequency analysis and language detection Chapter 3 – Vigenere Cipher Vigenere cipher theory and implementation how to crack Vigenere cipher with Kasiski-algorithm Chapter 4 – One Time Pad (Vernam Cipher) random and pseudo-random numbers the XOR logical operator one time pad theory and implementation why is it impossible to crack Vernam cipher? Shannon’s secrecy Chapter 5 – Data Encryption Standard (DES) data encryption standard (DES) theory and implementation cryptoanalysis techniques linear cryptoanalysis and differential cryptoanalysis Chapter 6 – Advanced Encryption Standard (AES) advanced encryption standard (AES) theory and implementation Shannon’s confusion and diffusion Chapter 7 – Asymmetric Cryptosystems problems with private key cryptosystems random numbers and prime numbers in cryptography Chapter 8 – Modular Arithmetic modular arithmetic fundamentals finding prime numbers – naive approach and advanced algorithms integer factorization problem discrete logarithm problem Chapter 9 – Diffie-Hellman Key Exchange Diffie-Hellman key exchange algorithm theory and implementation prime numbers and primitive roots man-in-the-middle attack Chapter 10 – RSA Algorithm RSA algorithm theory and implementation the problem of factorization Chapter 11 – Advanced Modular Arithmetic Euclidean and the greatest common divisor (GCD) problem extended Euclidean algorithm (EGCD) modular inverse problem Chapter 12 – Elliptic Curve Cryptography (ECC) elliptic curve cryptography theory and implementation why does Bitcoin use elliptic curve cryptography? Chapter 13 – Cryptographic Hashing what is hashing in cryptography? properties of hashing birthday paradox MD5 and SHA algorithms Thanks for joining my course, let’s get started!

Score according to professionals: 4.6

Download Udemy Course