Learn about the concepts, underlying math and techniques of historic and modern cryptography. Covers encryption, shared & public key ciphers, digital signatures, security of algorithms, protocols. Interactive course.
Summary
Summary
This course gives an introduction to the concepts, underlying math, principles and techniques of historic and modern cryptography; ties cryptographic protocols to real-world scenarios; and gives a necessary understanding of issues related to information security in general.
Featured Products & Technologies: Wolfram Language (available in Mathematica and Wolfram|One)
You'll Learn To
Use hash functions appropriately
Encrypt with symmetric (shared secret key) ciphers
Encrypt with asymmetric (public-key) ciphers
Examine the security of cryptographic algorithms
Digitally sign data
Consider information security objectives
Employ the right cryptographic protocols in information security
Combine different types of algorithms in complex cryptographic systems
Summary
Summary
This course gives an introduction to the concepts, underlying math, principles and techniques of historic and modern cryptography; ties cryptographic protocols to real-world scenarios; and gives a necessary understanding of issues related to information security in general.
Featured Products & Technologies: Wolfram Language (available in Mathematica and Wolfram|One)
You'll Learn To
Use hash functions appropriately
Encrypt with symmetric (shared secret key) ciphers
Encrypt with asymmetric (public-key) ciphers
Examine the security of cryptographic algorithms
Digitally sign data
Consider information security objectives
Employ the right cryptographic protocols in information security
Combine different types of algorithms in complex cryptographic systems