What You Will Learn How hash functions work and their internal algorithms. Asymmetric and symmetric encryption. The Diffie–Hellman protocol and digital signatures. Pseudorandom and cryptographically secure random number generators. Elliptic curve cryptography (ECC) and its use in Ethereum. The issue of signature malleability. Shamir’s secret sharing scheme. Consensus algorithms and BLS signatures. The nature of randomness in blockchain and its implementation via RANDAO.
Course Program 1. Hash Functions and Their Design Implementing a custom hash function, Merkle–Damgård construction, Luhn algorithm, and understanding how hashes work.
2. Asymmetric Encryption Diffie–Hellman protocol, digital signatures, building RSA from scratch, and the role of certificate authorities (CAs).
3. Random Number Generation Sources of randomness, PRNG, CSPRNG, TRNG, stream ciphers, and their use in cryptography.
4. Elliptic Curve Cryptography (ECC) ECC principles, ECDSA algorithm, and practical use in the Ethereum network.
5. Signatures and Their Malleability Digital signatures, the problem of signature malleability, and protection strategies.
6. Symmetric Encryption AES-GCM algorithm, Argon2, KDF, and practical implementation in Go.
7. Shamir’s Secret Sharing How Shamir’s secret sharing (SSS) works and its real-world applications.
8. Consensus and BLS Signatures Consensus algorithms in blockchain, BLS signatures, and the use of pairings.
9. Randomness in Blockchain RANDAO mechanism, decentralized randomness generation, vulnerabilities, and countermeasures.
Who This Course Is For Developers who want to understand cryptography basics for real-world applications. Blockchain developers and researchers. Technical students. Security engineers and pentesters.
What You Need to Start A computer with internet access. Basic knowledge of math and programming. A desire to dive deep into practical cryptography.
Learning Outcomes By the end of this course, you will: Be able to independently implement core cryptographic algorithms. Understand how digital signatures work and their use in blockchain. Grasp the mechanisms of randomness generation in decentralized systems. Learn how to design secure cryptographic protocols.