Cryptography – AES, RSA, ECC, SHA and RoT Secure Boot


Free Download Cryptography – AES, RSA, ECC, SHA and RoT Secure Boot
Published 7/2024
Created by Protocol Pro
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 59 Lectures ( 2h 10m ) | Size: 521 MB


Cryptography types, AES, RSA, SHA and ECC algorithm. TRNG and Digital Signature. Root of Trust and Secure boot flow.
What you’ll learn:
Defines the basics in cryptology (cryptography and cryptoanalysis)
Explains Symmetric key cryptography AES feature, algorithm and modes
Explains Asymmetric key cryptography RSA feature, algorithm and ECC algorithm
Explains Hashing cryptography SHA feature, algorithm and types
Cryptography Application: Root of Trust (RoT), TRNG and Digital Signature.
Requirements:
Basic knowledge in digital electronics and computer science required.
No programming experience required. You can learn the complete cryptographic algorithm for AES, RSS, SHA. Root of Trust and secure boot flow.
Description:
A job oriented exhaustive course on cryptography algorithm in security systems or microcontroller interface for transmit data from master device to slave device in a secure environment.In detail explanation on basics of cryptology study like Cryptography and its types, Cryptoanalysis and different types of attacks in secure processing environment.Understand about Encryption, decryption, public private key pair, Block cipher and stream cipher and Cryptography algorithm features.Understand about Symmetric key cryptography, asymmetric key cryptography and hashing cryptography.In detail explanation on basics of cryptoanalysis and different types of attacks in secure environment and how its resolved.Detailed explanation on AES (Advanced Encryption Standard) features, algorithm, key expansion module, Reverse AES key, AES modes – ECB, CBC, CFB, OFB and CTR mode. Basics on AES-GCM mode.Detailed explanation on RSA (Rivest-Shamir-Adleman) features, algorithm, key generation, public and private key pair. Basics on ECC (Elliptic Curve Cryptography) algorithm.Detailed explanation on SHA (Secure Hash Algorithm) features, algorithm, hashing and SHA types. Basic on HMAC (Hash-based Message Authentication Code).Generation of Random Number Generators (RNG) – Types PRNG (Pseudo RNG) and TRNG – (True RNG) and its physical sources for generation.Explanation on Digital signature. How a document are digitally signed and send from the sender and how the document was digitally sign verification happens at receiver.Detailed Explanation on Root of Trust (RoT) in a secure system, Secure Boot flow and Chain of Trust in a system platform to trust the device or OS or Application running.Loads quizzes to check your understanding about the communication protocols.Unlimited support with the instructor.Access to all the materialsAfter completing this course you can confidently understand how cryptographic algorithm works in security system interface or PC systems.Work through the lessons at your own place.
Who this course is for:
Embedded systems Development and Validation. Computer Science, Electronics and Electrical graduates
Homepage

https://www.udemy.com/course/cryptography-aes-rsa-ecc-sha-and-rot-secure-boot/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

No Password – Links are Interchangeable

Add a Comment

Your email address will not be published. Required fields are marked *