Loading...

Course Description

Cryptography has been around for thousands of years and is at the heart of digital communications today. Most people rely on cryptography on a daily basis without even knowing it; most popular messaging apps use encryption to ensure the security of messaging between two people. Blockchain technology, in a similar way, relies on cryptography to protect the identity of those sending and receiving messages and ensures that all information and transactions are secure and legitimate. Thus, to really understand blockchain technology, you have to understand the core principles of cryptography.

This course will walk you through the basics of cryptography: how information has historically been disguised (encrypted) and revealed (decrypted) using mathematics. You will see how a message can be turned into a number, and how that number can be encrypted and decrypted by two complete strangers. You will practice encrypting your own message to understand the basics of what makes a good encryption scheme. Then, you will delve deeper into the specific type of cryptography used in blockchain technology -- public key cryptography - and the promises and limitations it has in carrying out the core functions of a blockchain. You will create your own theoretical gold exchange in order to more fully understand how you can send anything to anyone around the world without a middleman. Ultimately you will know exactly how information on the blockchain is secured, legitimized, and authenticated without needing a third party to verify it.

You are required to have completed the following course or have equivalent experience before taking this course:

  • Cryptocurrencies and Ledgers

Faculty Author

Rafael Pass

Benefits to the Learner

  • Explain what the classic problem in cryptography is and how cryptographic keys relate to blockchains
  • Articulate why certain encryption schemes work by understanding the key design principles of good encryption
  • Know how to tell whether a blockchain is backed by solid cryptographic building blocks to avoid bad business decisions
  • Demystify how digital signatures prove origin of a message on the internet and thus provide a way to safely transfer any asset

Target Audience

  • Business leaders
  • Technology leaders, including CTOs
  • Entrepreneurs
  • Developers and software engineers interested in learning blockchain fundamentals
  • Anyone seeking to develop a greater understanding of blockchain and cryptocurrency

Applies Towards the Following Certificates

Loading...
Cornell Tech
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .