Advanced
Cryptography for Developers
Use libsodium and Web Crypto safely: keys, rotations, AEAD choices, and what to never implement yourself.
Overview
Labs rotate through tokenization, envelope encryption, and KMS integration patterns common in Japanese SaaS stacks. You leave with annotated snippets rather than hand-rolled ciphers.
Duration: 5 weeks · 34 hours · Format: Cohort · Language: English · Certificate: Included
Price (informational): ¥112,000
What is included
- Side-by-side comparisons of AES-GCM vs ChaCha20-Poly1305
- Key rotation runbook with zero-downtime cutover
- Homework on misuse of JWTs without moralizing
- Office hour walkthrough of HSM-backed flows
- Checklist for logging around crypto failures
- Reading list on post-quantum readiness without hype
Outcomes
- Select correct primitives for three product scenarios
- Draft a rotation plan engineering and ops can execute
- Identify two anti-patterns in your current codebase
Lead mentor
Noah Clarke
Applied cryptographer supporting regulated workloads in APAC.
FAQ
Comfort with modular arithmetic helps but we stay implementation-first; proofs are optional readings.
Experience notes
The JWT misuse homework stung in the best way — we deleted two custom “encryption” helpers the same week.
Yui · Mobile engineer · 5/5
Rotation runbook is now attached to our on-call binder; still tweaking timelines but structure is solid.
Diego · Identity platform