• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Log In
Join for Free
Coursera
University of Colorado System
Cryptographic Hash and Integrity Protection
  • About
  • Outcomes
  • Modules
  • Recommendations
  • Testimonials
  • Reviews
  1. Browse
  2. Computer Science
  3. Computer Security and Networks
University of Colorado System

Cryptographic Hash and Integrity Protection

This course is part of Applied Cryptography Specialization

Sang-Yoon Chang

Instructor: Sang-Yoon Chang

9,684 already enrolled

Included with Coursera Plus

•Learn more
4 modules
Gain insight into a topic and learn the fundamentals.
4.6

(89 reviews)

Intermediate level
Some related experience required
8 hours to complete
Flexible schedule
Learn at your own pace

4 modules
Gain insight into a topic and learn the fundamentals.
4.6

(89 reviews)

Intermediate level
Some related experience required
8 hours to complete
Flexible schedule
Learn at your own pace
  • About
  • Outcomes
  • Modules
  • Recommendations
  • Testimonials
  • Reviews

Skills you'll gain

  • Data Integrity
  • Encryption
  • Data Security
  • Authentications
  • Digital Communications
  • Cryptography
  • Public Key Cryptography Standards (PKCS)

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

5 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Learn more about Coursera for Business
 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Applied Cryptography Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 4 modules in this course

Welcome to Cryptographic Hash and Integrity Protection!

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization.

Cryptographic hash function is a fundamental building block in modern cryptography and is used for digital signature, message authentication, anomaly detection, pseudo-random number generator, password security, and so on. This module define cryptographic hash functions and contrast it with ordinary hash functions. It also describes the iterative structure for hash implementation to support the hash requirements.

What's included

7 videos2 readings1 assignment1 peer review

7 videos•Total 19 minutes
  • Instructor Introduction•4 minutes•Preview module
  • Module Objectives•0 minutes
  • Hash Function•0 minutes
  • Insecure Hash Function•2 minutes
  • Cryptographic Hash Function Requirements: One-Way and Collision Properties•4 minutes
  • Cryptographic Hash Function Security•3 minutes
  • Cryptographic Hash Function Structure•2 minutes
2 readings•Total 20 minutes
  • Get help and meet other learners in this course. Join your discussion forums!•5 minutes
  • Slides for Cryptographic Hash Function•15 minutes
1 assignment•Total 40 minutes
  • Cryptographic Hash Function•40 minutes
1 peer review•Total 60 minutes
  • Applying Hash Function•60 minutes

Building on the previous module defining cryptographic hash functions, this module review its uses and applications. We will first describe hash chain, which chains multiple hash functions in sequence, and apply hash chain for generating one-time passwords using a scheme called S/Key. Then, we will use hash functions to construct a binary tree and describe hash tree, also known as Merkle tree. Lastly, we will review the applications of hash function and hash tree for decentralized digital currency in the forms of cryptocurrency or bitcoins.

What's included

5 videos3 readings2 assignments

5 videos•Total 13 minutes
  • Module Objectives•0 minutes•Preview module
  • Hash Chain•1 minute
  • S/Key: One-Time Password•4 minutes
  • Hash Tree (Merkle Tree)•4 minutes
  • Cryptocurrency and Bitcoin•1 minute
3 readings•Total 115 minutes
  • Lamport's scheme (S/Key)•30 minutes
  • Slides for Cryptographic Hash Applications•15 minutes
  • TESLA Broadcasting Authentication•70 minutes
2 assignments•Total 48 minutes
  • Hash Chain and Hash Tree•40 minutes
  • Cryptocurrency and TESLA•8 minutes

Message authentication is to protect the message integrity and to perform sender authentication. This module describes message authentication code (MAC) which is based on symmetric keys. It contrasts MAC with hash functions or general encryption/decryption techniques and quantify the brute force attack difficulty for MAC and discuss the security requirements for MAC. The module also reviews two MAC implementations in Data Authentication Algorithm (DAA) and Cipher-Based MAC (CMAC), which are based on the use of block ciphers.

What's included

7 videos1 reading1 assignment

7 videos•Total 15 minutes
  • Module Objectives•0 minutes•Preview module
  • Message Authentication Approaches and Using Symmetric Encryption for Message Authentication•2 minutes
  • Message Authentication Code (MAC)•3 minutes
  • Brute-Force Attack on MAC•3 minutes
  • MAC Requirements•2 minutes
  • Digital Authentication Algorithm (DAA)•1 minute
  • Cipher-Based MAC (CMAC)•1 minute
1 reading•Total 15 minutes
  • Slides for Message Authentication Code•15 minutes
1 assignment•Total 45 minutes
  • Message Authentication Code•45 minutes

Like physical signatures in paper transactions, digital signature provides sender authentication and non-repudiation. This module describes how to use public-key pair to ensure the source of the packet. Then, it describes the purpose of digital signatures and the corresponding requirements. Lastly, we review a digital signature construction, which is the basis for many digital signature implementations such as RSA signature and Digital Signature Standard (DSS).

What's included

5 videos1 reading1 assignment2 peer reviews

5 videos•Total 7 minutes
  • Module Objectives•0 minutes•Preview module
  • Alice Uses Her Private Key•1 minute
  • Digital Signature Properties Beyond Message Authentication•2 minutes
  • Digital Signature Requirements•1 minute
  • Digital Signature Constrcution•1 minute
1 reading•Total 15 minutes
  • Slides for Digital Signature•15 minutes
1 assignment•Total 25 minutes
  • Digital Signature•25 minutes
2 peer reviews•Total 90 minutes
  • Public-Key Cryptography for Both Confidentiality and Source Authentication•50 minutes
  • MAC vs. Digital Signature•40 minutes

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Instructor ratings

Instructor ratings

We asked all learners to give feedback on our instructors based on the quality of their teaching style.

4.6 (11 ratings)
Sang-Yoon Chang
Sang-Yoon Chang
University of Colorado System
6 Courses•57,305 learners

Offered by

University of Colorado System

Offered by

University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.

Explore more from Computer Security and Networks

  • I

    ISC2

    Cryptography

    Course

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Cryptography and Hashing Overview

    Course

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Applied Cryptography

    Specialization

  • Status: Preview
    Preview
    B

    Ball State University

    Cybersecurity and Secure Software Design

    Course

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

4.6

89 reviews

  • 5 stars

    70.78%

  • 4 stars

    19.10%

  • 3 stars

    6.74%

  • 2 stars

    1.12%

  • 1 star

    2.24%

Showing 3 of 89

R
RK
5

Reviewed on Nov 13, 2024

Very helpful course to learn Cryptography..! and Sang-Yoon Chang is a nice teacher.

A
AJ
5

Reviewed on May 25, 2020

One of the best courses on hashing in cryptography...

S
SK
5

Reviewed on Jun 11, 2020

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

View more reviews
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Learn more

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Explore degrees

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Learn more

Frequently asked questions

Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

  • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.

  • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.

When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policyOpens in a new tab.

Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.

More questions

Visit the learner help center

Financial aid available,

Coursera Footer

Technical Skills

  • ChatGPT
  • Coding
  • Computer Science
  • Cybersecurity
  • DevOps
  • Ethical Hacking
  • Generative AI
  • Java Programming
  • Python
  • Web Development

Analytical Skills

  • Artificial Intelligence
  • Big Data
  • Business Analysis
  • Data Analytics
  • Data Science
  • Financial Modeling
  • Machine Learning
  • Microsoft Excel
  • Microsoft Power BI
  • SQL

Business Skills

  • Accounting
  • Digital Marketing
  • E-commerce
  • Finance
  • Google
  • Graphic Design
  • IBM
  • Marketing
  • Project Management
  • Social Media Marketing

Career Resources

  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Get a PMP Certification
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Popular Data Analytics Certifications
  • What Does a Data Analyst Do?
  • Career Development Resources
  • Career Aptitude Test
  • Share your Coursera Learning Story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • ECTS Credit Recommendations

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok
Coursera

Sign up

Learn on your own time from top universities and businesses.

​
​
Between 8 and 72 characters
Your password is hidden
​

or

Already on Coursera?


Having trouble logging in? Learner help center

This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.