Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Overview
Syllabus
- Perfect Ciphers
- What makes certain ciphers perfect.,How the Lorenz Cipher was broken.
- Symmetric Encryption
- Sending messages when two people share a secret.
- Key Exchange
- Techniques to establish a shared secret.
- Asymmetric Encryption
- Exchanging information using public key cryptosystems.
- Public Key Protocols
- Encrypted key exchange, certificates, secure commerce.
- Using Cryptographic Primitives
- How cryptography can be useful for anonymizing communication, voting, and digital cash.
- Secure Computation
- Computing without exposing data.
Taught by
David Evans
Tags
Reviews
4.2 rating, based on 5 Class Central reviews
Showing Class Central Sort
-
Great course. I had tried other crypto courses and nothing every stuck. I found the others to get into too great of depth too quickly. After this course, I developed the ability to critically think about cryptographic protocols and primitives. I am also ready for classes that go in greater depth.
-
This course content is excellent. Short lectures, Multiple choice questions, great approach. I recommend this course to every student interested in learning Cryptography.
-
Complete the course , good introduction to cyber security. Touches different aspects.
Skipped the programming due to time issues. -