Loading...

How are Cryptographic Hash Function Attacked? Part II

Course video 17 of 18

Continuing on our exploration of the fundamental concept of cryptography, this module will explain the Hash Function, its purpose and application, potential attack vectors, and the importance of hash functions on cryptographic design. Upon completion you will be able to understand the role that hash functions play in cryptography and how cryptographic hash functions differ from other types of hash functions.

À propos de Coursera

Cours, Spécialisations et Diplômes en ligne enseignés par des enseignants du plus haut niveau provenant des meilleurs universités et établissements d'enseignement du monde.

Community
Join a community of 40 million learners from around the world
Certificate
Earn a skill-based course certificate to apply your knowledge
Career
Gain confidence in your skills and further your career