University of Colorado Boulder - Cryptography and Information Theory
- Offered byCoursera
Cryptography and Information Theory at Coursera Overview
Duration | 8 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Cryptography and Information Theory at Coursera Highlights
- 20% got a tangible career benefit from this course.
- Earn a shareable certificate upon completion.
- Flexible deadlines according to your schedule.
Cryptography and Information Theory at Coursera Course details
- Welcome to Cryptography and Information Theory!
- This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.
- This course is a part of the Applied Cryptography specialization.
Cryptography and Information Theory at Coursera Curriculum
Cryptography Overview
Instructor Introduction
Module Objectives
Alice, Bob, and Eve
Cryptography Terminology
Threat Model and the Attacker Knowledge
Kerckhoff's Principle
Security by Obscurity and Steganography, Part 1
Security by Obscurity and Steganography, Part 2
Slides for Cryptography Overview
Kerckhoff's Principle and Security by Obscurity
Information Entropy
Module Objectives
Deterministic vs. Random
Information Entropy
Entropy: Uniform Distribution Case
Entropy: General Distribution Case
Entropy Recap
Slides for Information Entropy
Throwing a Dice
Entropy: Balls in a Bin
Brute-Force Attack and Cryptanalysis
Module Objectives
Brute Force Attack
Cryptanalysis
Perfect Secrecy and One-Time Pad
Lecture Slides for Brute Force and Cryptanalysis
Brute-Force Attack, Cryptanalysis, and One-Time Pad
Computational Security and Side-Channel Attack
Module Objectives
Computational Security: Attacker's Computational Bound
Side-Channel Attack
Lecture Slides for Computational Security and Side Channel Attacks
Reading on physical side-channel attacks
Cryptography and Information Theory at Coursera Admission Process
Important Dates
Other courses offered by Coursera
Student Forum
Useful Links
Know more about Coursera
Know more about Programs
- Engineering
- Instrumentation Technology
- Food Technology
- Aeronautical Engineering
- Artificial Intelligence and Machine Learning
- Metallurgical Engineering
- MTech in Computer Science Engineering
- VLSI Design
- Petroleum Engineering
- Aerospace Engineering
- BTech in Biotechnology Engineering
- Pharmaceutical engineering
- Silk Technology
- Microelectronics
- Agriculture & Farm Engineering