This course focus is on symmetric encryption and hash functions, we will understand the inner parts, while still making the learning curve fun and simple.
We will look at the secret key generation, how do we generate keys, it is much more complex than you thought.
It involves permutations of the bitstream, swapping bits, shifting, substitution them, and finally doing the XOR bitwise operation.
What will you learn in this course?
We will dive into block ciphers mode of operation, how algorithms join the block ciphers together and send them along, a key concept of every symmetric encryption.
What will you learn of hash functions?
Hash functions are calculated to keep our messages intact.
How do we keep the integrity and authenticity of our files using salted hash and MAC's- Message Authentication Codes and humans, cryptographic hash functions.
You should have basic computer skills.