Coursera
Coursera Logo

University of Colorado Boulder - Cryptography and Information Theory 

  • Offered byCoursera

Cryptography and Information Theory
 at 
Coursera 
Overview

Duration

8 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cryptography and Information Theory
 at 
Coursera 
Highlights

  • 20% got a tangible career benefit from this course.
  • Earn a shareable certificate upon completion.
  • Flexible deadlines according to your schedule.
Details Icon

Cryptography and Information Theory
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • Welcome to Cryptography and Information Theory!
  • This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.
  • This course is a part of the Applied Cryptography specialization.

Cryptography and Information Theory
 at 
Coursera 
Curriculum

Cryptography Overview

Instructor Introduction

Module Objectives

Alice, Bob, and Eve

Cryptography Terminology

Threat Model and the Attacker Knowledge

Kerckhoff's Principle

Security by Obscurity and Steganography, Part 1

Security by Obscurity and Steganography, Part 2

Slides for Cryptography Overview

Kerckhoff's Principle and Security by Obscurity

Information Entropy

Module Objectives

Deterministic vs. Random

Information Entropy

Entropy: Uniform Distribution Case

Entropy: General Distribution Case

Entropy Recap

Slides for Information Entropy

Throwing a Dice

Entropy: Balls in a Bin

Brute-Force Attack and Cryptanalysis

Module Objectives

Brute Force Attack

Cryptanalysis

Perfect Secrecy and One-Time Pad

Lecture Slides for Brute Force and Cryptanalysis

Brute-Force Attack, Cryptanalysis, and One-Time Pad

Computational Security and Side-Channel Attack

Module Objectives

Computational Security: Attacker's Computational Bound

Side-Channel Attack

Lecture Slides for Computational Security and Side Channel Attacks

Reading on physical side-channel attacks

Cryptography and Information Theory
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cryptography and Information Theory
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...