25070 SEC1: Introduction to Cryptography: Demystifying the Magic (August 2025)

In this class you will learn key security concepts such as ECC256, SHA256, AES128, MAC, HMAC, CMAC, and RSA, how to identify and implement security requirements in a design, methods for storing and protecting critical keys, and the basic principles of cryptography—including authentication, hashing, signing, and verification—focusing on practical applications of both symmetric and asymmetric cryptography for secure designs.

rate limit

Code not recognized.

About this course

This class will introduce you to key security concepts such as ECC256, SHA256, AES128, MAC, HMAC, CMAC, and RSA. You will learn to identify security aspects required in a design, describe methods of storage and protection of critical keys, and explain the basic principles of cryptography including authentication, hashing, and sign and verification. By the end of the class, you will have a solid understanding of cryptography and its application in secure designs.

Prerequisites:

None

Since this class is pretty much based on the existing MU Course Cryptography Primer we copied over the content of this class:

The target audience are those unfamiliar with how cryptography works or those very rusty and in need of a refresher. Both symmetric and asymmetric cryptography will be covered and examples will be shown on how each are used in real-world examples. It will be shown how identity is created and used for authentication, integrity, and confidentiality.  Due to time limitations, math proofs of these functions are unable to be presented.  Only practical use is covered.

Curriculum80 min

  • Class Syllabus
  • Introduction
  • Introduction 1 min
  • Our Background 2 min
  • Perceptions and Expectations
  • Perceptions and Expectations 5 min
  • Knowledge Check 2 min
  • Authentication, Integrity & Confidentiality
  • CIA 4 min
  • Authentication 4 min
  • Knowledge Check 2 min
  • Cryptographic Building Blocks
  • Hash Function 5 min
  • Knowledge Check 2 min
  • Symmetric Key 4 min
  • Knowledge Check 2 min
  • Message Authentication 7 min
  • Session Keys 4 min
  • Knowledge Check 2 min
  • Asymmetric Cryptography 6 min
  • Knowledge Check 2 min
  • Chain of Trust 6 min
  • Knowledge Check 2 min
  • A real-world example
  • Application Example 5 min
  • Knowledge Check 2 min
  • Elliptic Curve Diffie - Hellman Example 8 min
  • Knowledge Check 2 min
  • Wrap Up
  • Closing 2 min
  • Your Feedback
  • We need your Feedback

About this course

This class will introduce you to key security concepts such as ECC256, SHA256, AES128, MAC, HMAC, CMAC, and RSA. You will learn to identify security aspects required in a design, describe methods of storage and protection of critical keys, and explain the basic principles of cryptography including authentication, hashing, and sign and verification. By the end of the class, you will have a solid understanding of cryptography and its application in secure designs.

Prerequisites:

None

Since this class is pretty much based on the existing MU Course Cryptography Primer we copied over the content of this class:

The target audience are those unfamiliar with how cryptography works or those very rusty and in need of a refresher. Both symmetric and asymmetric cryptography will be covered and examples will be shown on how each are used in real-world examples. It will be shown how identity is created and used for authentication, integrity, and confidentiality.  Due to time limitations, math proofs of these functions are unable to be presented.  Only practical use is covered.

Curriculum80 min

  • Class Syllabus
  • Introduction
  • Introduction 1 min
  • Our Background 2 min
  • Perceptions and Expectations
  • Perceptions and Expectations 5 min
  • Knowledge Check 2 min
  • Authentication, Integrity & Confidentiality
  • CIA 4 min
  • Authentication 4 min
  • Knowledge Check 2 min
  • Cryptographic Building Blocks
  • Hash Function 5 min
  • Knowledge Check 2 min
  • Symmetric Key 4 min
  • Knowledge Check 2 min
  • Message Authentication 7 min
  • Session Keys 4 min
  • Knowledge Check 2 min
  • Asymmetric Cryptography 6 min
  • Knowledge Check 2 min
  • Chain of Trust 6 min
  • Knowledge Check 2 min
  • A real-world example
  • Application Example 5 min
  • Knowledge Check 2 min
  • Elliptic Curve Diffie - Hellman Example 8 min
  • Knowledge Check 2 min
  • Wrap Up
  • Closing 2 min
  • Your Feedback
  • We need your Feedback