وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Symmetric Cryptography Essential Training

سرفصل های دوره

If you work with computers, you use cryptography. Symmetric cryptography is a common method that uses the same key for encryption and decryption of data. Faster and less resource-intensive than asymmetric cryptography, symmetric cryptography is important for all IT professionals to understand. This course delivers a practical overview of the technology, emphasizing high-level concepts that affect how our data is stored and transmitted. Jeremy Hansen explains the difference between single key (symmetric) and multiple key (asymmetric) algorithms, and shows how symmetric encryption affects underlying binary data. Learn about the basic ciphers used in symmetric cryptography, including substitution, permutation, and transposition, and influential symmetric-key algorithms like the Advanced Encryption Standard and its predecessor, the Data Encryption Standard. Review modern block cipher modes like cipher block chaining (CBC), cipher feedback (CFB), and counter (CTR), which can help secure large amounts of data.


01 - Introduction
  • 01 - Cryptography is everywhere
  • 02 - Basic terminology
  • 03 - Intro to Codespaces

  • 02 - 1. Symmetric Cryptography Overview
  • 01 - Cryptographys role
  • 02 - Kerckhoffss principle
  • 03 - Symmetric keys
  • 04 - Block vs. stream ciphers
  • 05 - Cryptographic hash algorithms
  • 06 - Challenge Building a hash algorithm
  • 07 - Solution Building a hash algorithm

  • 03 - 2. Representing and Manipulating Binary Data
  • 01 - Binary representation
  • 02 - Characters
  • 03 - Integers
  • 04 - Floating point numbers
  • 05 - Boolean operations
  • 06 - Padding
  • 07 - Challenge QR code printer
  • 08 - Solution QR code printer

  • 04 - 3. Fundamental Algorithms and Components
  • 01 - Simple substitution ciphers
  • 02 - Polyalphabetic substitution ciphers
  • 03 - Permutation and transposition ciphers
  • 04 - Simple one-time pads with XOR
  • 05 - S-boxes and P-boxes
  • 06 - Feistel networks
  • 07 - Linear-feedback shift registers (LFSRs)
  • 08 - Challenge Software-based LFSR
  • 09 - Solution Software-based LFSR

  • 05 - 4. Symmetric Algorithms
  • 01 - The Data Encryption Standard (DES)
  • 02 - The Advanced Encryption Standard (AES)
  • 03 - AES and DES in practice
  • 04 - The RC4 stream cipher
  • 05 - Challenge Encrypting, decrypting, and hashing with OpenSSL
  • 06 - Solution Encrypting, decrypting, and hashing with OpenSSL

  • 06 - 5. Block Cipher Modes
  • 01 - Introduction to block cipher modes
  • 02 - Cipher block chaining (CBC)
  • 03 - CFB Cipher feedback
  • 04 - OFB Output feedback
  • 05 - CTR Counter mode
  • 06 - Challenge Building a block cipher with CBC mode
  • 07 - Solution Building a block cipher with CBC mode

  • 07 - 6. Keys and a Little Asymmetry
  • 01 - Exchanging keys
  • 02 - Key length and large numbers
  • 03 - The importance of randomness to cryptography
  • 04 - Modular arithmetic
  • 05 - DiffieHellman key exchange
  • 06 - Challenge Implementing DiffieHellman
  • 07 - Solution Implementing DiffieHellman

  • 08 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 42661
    حجم: 252 مگابایت
    مدت زمان: 130 دقیقه
    تاریخ انتشار: ۲۷ دی ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید