Introduction to Applied Cryptography
- Offered byCoursera
Introduction to Applied Cryptography at Coursera Overview
Duration | 20 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Introduction to Applied Cryptography at Coursera Highlights
- Earn a Certificate upon completion
Introduction to Applied Cryptography at Coursera Course details
- This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency
- In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today
- You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings
- You will also explore the wider infrastructure surrounding cryptography and how this impacts the overall security of systems deploying cryptography
Introduction to Applied Cryptography at Coursera Curriculum
Introduction to the course and the Cryptographic Toolkit
Introduction to the course
How to setup a study journal
Introduction to cryptography
Physical world security services
Core services
Week 1 summary
Course syllabus
Starting your studies
Everyday cryptography: fundamental principles and applications by Keith Martyn
First thoughts on cryptography
Risks to information
Security services
Relationship between services
Cryptographic terminology
Activity: Identifying algorithms
Reflection
Stealing data
Cryptography and availability
Week 1 test
Applications of Cryptography
Introduction to applications of cryptography
Introduction to the Big Six
Wi-Fi services
Week 2 summary
Case study: Supporting mobile call protection
Reflection
Week 2 test
Cryptosystems
Introduction to cryptosystems
Algorithms and keys
How different types of cryptosystem are used
Week 3 summary
Model of a cryptosystem
Two types of cryptosystem
Reflection
Is this a cryptosystem?
Navajo code talker
Week 3 test
Attacking Cryptosystems
Introduction to attacking cryptosystems
Points of weakness
Two worlds
Week 4 summary
Course summary
Security assumptions
Exhaustive key search
Activity: Large numbers
Key lengths
Classes of attack
Latest thoughts on cryptography
Reflection
Kerckhoff assumptions
Public v proprietary
Practicalities of key search
DES and AES key searches
Week 4 test