Find the perfect coding resourcesLearn how skillcraft.ai helps developers find the perfect coding learning resourcesLearn more→

Lane Wagner
Instructor
Lane is a back-end engineer and the lead instructor of Boot.dev. He has taught over one million students worldwide, on Boot.dev, FreeCodeCamp, YouTube and the Backend Banter podcast. Lane worked as a backend engineer writing Go, Python and TypeScript, then moved into engineering management and a couple of years later left to build Boot.dev full-time.
Completion
Certificate included
Format
Interactive coding
Freemium
Implement symmetric encryption and decryption in Go
Build secure hashing algorithms for password storage
Create and verify digital signatures using RSA
Understand and apply asymmetric encryption techniques in real-world applications
Utilize key derivation functions for secure key management
Ever wondered how your data stays safe online? This deep-dive in the Go programming language will teach you all about encryption, password security, ciphers, and more. After you master the fundamentals, you'll learn how each cryptographic primitive is used in real-world applications.
Learn the basics of cryptography: encrypting and decrypting a secret message with a key
To be able to work with encrypted data, you need to understand how information is encoded in different formats
Learn about the most primitive, but most important kind of crypto attack
Learn about the fundamentals of ciphers, starting with Julius Caesar's famous cipher
Study the importance of the XOR operation in cryptography and how it can be used to create the perfect cipher
Stream ciphers can be used to encrypt data as it flows through a system
Block ciphers are commonly used to encrypt large amounts of data at rest, like entire hard drives
DES is an older block cipher that's important to understand to appreciate modern block ciphers
AES is a secure, modern block cipher that's used in many production applications
Asymmetric encryption is used in HTTPS, digital signatures, and really anywhere two parties need to securely communicate
RSA is one of the most popular asymmetric encryption algorithms
Hashing has many applications in cryptography, including password security and message integrity
Digital signatures are a way to prove that a message was sent by a particular party
Key derivation functions are how we derive keys from passwords or from other keys securely
Share Your Experience
Sign in to leave a review and help others
No reviews yet. Be the first to review!