Cryptographic Hash and Integrity Protection
Welcome to Cryptographic Hash and Integrity Protection!
This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.
This course is a part of the Applied Cryptography specialization.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Related AI Lessons
⚡
⚡
⚡
⚡
35 ChatGPT Prompts for Wealth Managers: Strengthen Client Relationships, Sharpen Analysis, and Scale Your Practice
Dev.to AI
I Built an Open-Source AI Tools Directory with 850+ Tools — Here's Why and How
Dev.to AI
Your Tech Stack Has an AI Problem: How to Audit and Fix It in 2026
Dev.to · Lycore Development
If you follow my Linux and DevOps articles — this one is different. I built something. Let me tell you about it.
Dev.to AI
🎓
Tutor Explanation
DeepCamp AI