Master Cryptographic Hashing & Digital Signatures
Learn the mathematical foundations and practical implementations that secure our digital world. From SHA-256 to RSA signatures, build expertise that matters in 2025's cybersecurity landscape.
Explore Course MaterialsBeyond Surface-Level Security
Most security courses teach you to use tools. We teach you to understand the mathematics behind them. When you grasp why SHA-3 was designed differently from SHA-2, or how elliptic curve signatures achieve the same security with smaller keys, you're not just following procedures.
You're thinking like the cryptographers who built these systems. Our students in Bangkok's tech sector tell us this depth makes the difference between implementing security features and actually securing systems.
Hash Functions That Changed Everything
MD5 to SHA Evolution
See how collision attacks destroyed MD5's credibility and why SHA-256 became the backbone of Bitcoin. We'll show you the exact mathematical weaknesses that made MD5 obsolete.
SHA-3 Revolution
Unlike its predecessors, SHA-3 uses sponge construction instead of Merkle-Damgård. Learn why NIST chose Keccak and how this architectural change prevents length extension attacks.
BLAKE2 Performance
Faster than MD5, more secure than SHA-2. Discover how BLAKE2's tree hashing enables parallel processing while maintaining cryptographic strength that rivals SHA-3.
Real-World Impact
These aren't academic exercises. Every concept connects directly to systems you'll encounter in professional development and security auditing.
- Certificate validation in HTTPS connections - why browsers trust certain signatures
- Blockchain mining algorithms - how proof-of-work actually validates transactions
- Password storage systems - why bcrypt beats simple hashing
- Code signing for software distribution - preventing malware injection
- Database integrity checks - detecting unauthorized modifications
Enterprise Integration
See how Fortune 500 companies implement hash-based integrity systems across distributed architectures.
Advanced Analysis
Learn to evaluate new hashing algorithms and signature schemes as they emerge in research papers.
Your Learning Journey
We're accepting applications for our intensive 16-week program starting September 2025. This isn't a typical online course - it's structured mentorship with working cryptography professionals.
Foundation Phase
Mathematical prerequisites and number theory fundamentals
Algorithm Deep-Dive
Implementation and analysis of major hash families
Signature Systems
RSA, DSA, ECDSA, and post-quantum alternatives
Capstone Project
Build and audit a complete cryptographic system
Kasper Lindgren
Lead Instructor
Henrik Novák
Applied Cryptography Specialist