Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.Why Take This Course?
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.
Lesson 1: Perfect Ciphers
What makes certain ciphers perfect, how the Lorenz Cipher was broken
Lesson 2: Symmetric Encryption
Sending messages when two people share a secret
Lesson 3: Key Exchange
Techniques to establish a shared secret
Lesson 4: Asymmetric Encryption
Exchanging information using public key cryptosystems
Lesson 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerce
Lesson 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cash
Lesson 7: Secure Computation
Computing without exposing data