Companies Home Search Profile

Public Key Infrastructure (PKI) with OpenSSL (RSA and ECC)

Focused View

Holczer Balazs

3:33:34

7 View
  • 1. What is cryptography.mp4
    05:04
  • 2. Symmetric encryption.mp4
    03:18
  • 3. Asymmetric encryption.mp4
    03:15
  • 4. Cryptography Fundamentals Quiz.html
  • 1. Setting up OpenSSL.mp4
    03:20
  • 1. Generating RSA related private and public keys.mp4
    08:35
  • 2. Encryption with RSA keys.mp4
    04:16
  • 3. Generating elliptic curve related private and public keys.mp4
    07:06
  • 1. What are root and intermediate certificates.mp4
    10:59
  • 2. Certificates Quiz.html
  • 1. Generating self-signed certificates.mp4
    05:56
  • 2. Certificate parameters.mp4
    07:58
  • 3. Using configuration file I.mp4
    10:25
  • 4. Using configuration file II.mp4
    06:39
  • 1. What is a certificate signing request (CSR).mp4
    06:49
  • 2. CSR Quiz.html
  • 1. Creating certificate signing request (CSR) in OpenSSL.mp4
    06:09
  • 2. Signing certificate signing requests.mp4
    08:01
  • 3. Using configuration files for extensions.mp4
    05:12
  • 4. Verifying the chain of trust.mp4
    06:09
  • 1. What is the HTTP protocol.mp4
    03:48
  • 2. TCP 3-way handshake.mp4
    07:31
  • 3. TLS handshake and certificate verification.mp4
    07:23
  • 4. TLS handshake and key exchange.mp4
    07:39
  • 5. Encrypted data transfer.mp4
    03:22
  • 1. RSA cryptosystem basics.mp4
    05:43
  • 2. RSA cryptosystem - the algorithm.mp4
    05:52
  • 3. RSA cryptosystem - example.mp4
    05:01
  • 4. Is it possible to crack the RSA cryptosystem.mp4
    04:09
  • 5. RSA Quiz.html
  • 1. Why do we need elliptic curve cryptography.mp4
    02:49
  • 2. What are elliptic curves.mp4
    04:19
  • 3. Point addition and point doubling.mp4
    14:01
  • 4. Double and add algorithm.mp4
    04:30
  • 5. Elliptic curve discrete logarithm problem.mp4
    03:34
  • 6. Elliptic curve based Diffie-Hellman key exchange algorithm.mp4
    05:47
  • 7. Digital signatures with elliptic curves.mp4
    10:43
  • 8. RSA and elliptic curve cryptography.mp4
    03:12
  • 9. Is it possible to crack elliptic curves.mp4
    05:00
  • 10. Elliptic Curve Cryptography Quiz.html
  • Description


    Understand Public Key Infrastructure (PKI), OpenSSL, CSR, Certificates, Public Key Cryptosystems (RSA and ECC) in Java

    What You'll Learn?


    • Understand the basics of public key crypto-systems
    • Understand the basics of public key infrastructure (PKI)
    • Understand certificates (root and intermediate certificates)
    • Understand certificate signing requests (CSRs)
    • Understand RSA and ECC
    • Understand TLS protocol

    Who is this for?


  • Anyone curious about cryptography!
  • What You Need to Know?


  • No programming experience needed
  • More details


    Description

    In this course you will learn about cryptography, certificates and certificate signing requests (CSRs) with OpenSSL. You will understand the most popular pubic key (asymmetric) cryptosystems on a step by step basis - such as RSA and Elliptic Curve cryptosystems. You can learn about the theory as well as the implementation for every approach.

    Chapter 1 - Cryptography Fundamentals

    • what is the aim of cryptography?

    • private key and public key cryptosystems

    Chapter 2 - Public and Private Keys in OpenSSL

    • generating RSA keys

    • encryption example with RSA

    • generating ECC keys

    Chapter 3 - Certificates

    • root certificates (self-signed certificates) and intermediate certificates

    • certificate parameters and configuration files

    Chapter 4 - Certificate Signing Request (CSR)

    • what are certificate signing requests?

    • signing intermediate certificates

    • verifying the chain of trust

    Chapter 5 - Transport Layer Protocol (TLS)

    • what is the transport layer protocol?

    • how network communication works

    • certificate revocation list (CRL)

    Chapter 6 - RSA Algorithm

    • RSA algorithm theory

    • the problem of factorization

    • is it possible to crack RSA algorithm?

    Chapter 7 - Elliptic Curve Cryptography (ECC)

    • elliptic curve cryptography theory

    • double and add algorithm

    • point addition algorithm

    • digital signatures with elliptic curves

    • why does Bitcoin use elliptic curve cryptography?

    • is it possible to crack elliptic curves?

    Thanks for joining my course, let's get started!

    Who this course is for:

    • Anyone curious about cryptography!

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Holczer Balazs
    Holczer Balazs
    Instructor's Courses
    My name is Balazs Holczer. I am from Budapest, Hungary. I am qualified as a physicist. At the moment I am working as a simulation engineer at a multinational company. I have been interested in algorithms and data structures and its implementations especially in Java since university. Later on I got acquainted with machine learning techniques, artificial intelligence, numerical methods and recipes such as solving differential equations, linear algebra, interpolation and extrapolation. These things may prove to be very very important in several fields: software engineering, research and development or investment banking. I have a special addiction to quantitative models such as the Black-Scholes model, or the Merton-model.Take a look at my website if you are interested in these topics!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 35
    • duration 3:33:34
    • Release Date 2024/03/12