DEV Community

Cover image for Cryptography Course Released on Boot.dev
Lane Wagner for Boot.dev

Posted on • Originally published at blog.boot.dev

1

Cryptography Course Released on Boot.dev

Greetings! We're excited to announce that we've unveiled a brand-new cryptography course on Boot.dev. We're convinced that this new experience is truly one of a kind. If you want to learn cryptography while writing real code in the Go programming language, you should check it out.

You can get started for free here.

Why learn cryptography?

Ever wondered how your data is kept safe online? This course will teach you about encryption, password security, ciphers, and more. After you master the fundamentals, you'll learn how each cryptographic primitive is used in real-world applications.

If you're interested in becoming a valuable back-end engineer, an understanding of cryptography will set you apart from other candidates that will fail to answer basic security questions.

Chapters

1. Symmetric Encryption

Learn the basics of cryptography: encrypting and decrypting a secret message with a key

2. Encoding

To be able to work with encrypted data, you need to understand how information is encoded in different formats

3. Brute Force

Learn about the most primitive, but most important kind of crypto attack

4. Caesar Cipher

Learn about the fundamentals of ciphers, starting with Julius Caesar's famous cipher

5. XOR

Study the importance of the XOR operation in cryptography and how it can be used to create the perfect cipher

6. Stream Ciphers

Stream ciphers can be used to encrypt data as it flows through a system

7. Block Ciphers

Block ciphers are commonly used to encrypt large amounts of data at rest, like entire hard drives

8. DES

DES is an older block cipher that's important to understand to appreciate modern block ciphers

9. AES

AES is a secure, modern block cipher that's used in many production applications

10. Asymmetric Encryption

Asymmetric encryption is used in HTTPS, digital signatures, and anywhere two parties need to securely communicate

11. RSA

RSA is one of the most popular asymmetric encryption algorithms

12. Hash Functions

Hashing has many applications in cryptography, including password security and message integrity

13. Digital Signatures

Digital signatures are a way to prove that a message was sent by a particular party

14. KDFs

Key derivation functions are how we derive keys from passwords or other keys securely

What's inside?

You'll find text and image explanations of all the concepts, as well as video explanations of some of the more visually demanding lessons. You'll be writing real code in Go in most of the exercises, and our system will instantly check your code and provide instant feedback. You'll only enjoy the course if you enjoy an engaging hands-on experience.

Do your career a big favor. Join DEV. (The website you're on right now)

It takes one minute, it's free, and is worth it for your career.

Get started

Community matters

Top comments (0)

👋 Kindness is contagious

Discover a treasure trove of wisdom within this insightful piece, highly respected in the nurturing DEV Community enviroment. Developers, whether novice or expert, are encouraged to participate and add to our shared knowledge basin.

A simple "thank you" can illuminate someone's day. Express your appreciation in the comments section!

On DEV, sharing ideas smoothens our journey and strengthens our community ties. Learn something useful? Offering a quick thanks to the author is deeply appreciated.

Okay