Online Course
Applied Cryptography
University of Virginia via Udacity
-
1.3k
-
- Write review
Overview
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Why Take This Course?
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.
Syllabus
Lesson 1: Perfect Ciphers
What makes certain ciphers perfect, how the Lorenz Cipher was broken
Lesson 2: Symmetric Encryption
Sending messages when two people share a secret
Lesson 3: Key Exchange
Techniques to establish a shared secret
Lesson 4: Asymmetric Encryption
Exchanging information using public key cryptosystems
Lesson 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerce
Lesson 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cash
Lesson 7: Secure Computation
Computing without exposing data
Taught by
David Evans
Related Courses
-
Introduction to Applied Cryptography
University of Colorado System
-
Applied Cryptography
University of Colorado System
-
Foundations of Cryptography
Indian Institute of Technology Bangalore, NPTEL
-
Asymmetric Cryptography and Key Management
University of Colorado System
-
Ethical Hacking: Cryptography
-
Cryptography I
Stanford University
4.7
Reviews
4.2 rating, based on 5 reviews
-
Priya John completed this course, spending 3 hours a week on it and found the course difficulty to be medium.
This course content is excellent. Short lectures, Multiple choice questions, great approach. I recommend this course to every student interested in learning Cryptography. -
Anonymous completed this course.
Great course. I had tried other crypto courses and nothing every stuck. I found the others to get into too great of depth too quickly. After this course, I developed the ability to critically think about cryptographic protocols and primitives. I am also ready for classes that go in greater depth. -
Nitish Singh completed this course.
Complete the course , good introduction to cyber security. Touches different aspects.
Skipped the programming due to time issues. -
Ciprian Dan Chirilă completed this course.
-
Olivier Schnitzeler completed this course.