Course: «Solidity Programming Language — Level Basic»

$
1290.00
$
1690.00
The course covers Solidity fundamentals, testing, front-end integration, as well as key aspects of security and optimization. You will explore popular token standards and build working projects you can showcase in your portfolio.

What You Will Learn
How hash functions work and their internal algorithms.
Asymmetric and symmetric encryption.
The Diffie–Hellman protocol and digital signatures.
Pseudorandom and cryptographically secure random number generators.
Elliptic curve cryptography (ECC) and its use in Ethereum.
The issue of signature malleability.
Shamir’s secret sharing scheme.
Consensus algorithms and BLS signatures.
The nature of randomness in blockchain and its implementation via RANDAO.

Course Program
1. Hash Functions and Their Design
Implementing a custom hash function, Merkle–Damgård construction, Luhn algorithm, and understanding how hashes work.

2. Asymmetric Encryption
Diffie–Hellman protocol, digital signatures, building RSA from scratch, and the role of certificate authorities (CAs).

3. Random Number Generation
Sources of randomness, PRNG, CSPRNG, TRNG, stream ciphers, and their use in cryptography.

4. Elliptic Curve Cryptography (ECC)
ECC principles, ECDSA algorithm, and practical use in the Ethereum network.

5. Signatures and Their Malleability
Digital signatures, the problem of signature malleability, and protection strategies.

6. Symmetric Encryption
AES-GCM algorithm, Argon2, KDF, and practical implementation in Go.

7. Shamir’s Secret Sharing
How Shamir’s secret sharing (SSS) works and its real-world applications.

8. Consensus and BLS Signatures
Consensus algorithms in blockchain, BLS signatures, and the use of pairings.

9. Randomness in Blockchain
RANDAO mechanism, decentralized randomness generation, vulnerabilities, and countermeasures.


Who This Course Is For
Developers who want to understand cryptography basics for real-world applications.
Blockchain developers and researchers.
Technical students.
Security engineers and pentesters.

What You Need to Start
A computer with internet access.
Basic knowledge of math and programming.
A desire to dive deep into practical cryptography.

Learning Outcomes
By the end of this course, you will:
Be able to independently implement core cryptographic algorithms.
Understand how digital signatures work and their use in blockchain.
Grasp the mechanisms of randomness generation in decentralized systems.
Learn how to design secure cryptographic protocols.