Coursera
Coursera Logo

Introduction to Applied Cryptography 

  • Offered byCoursera

Introduction to Applied Cryptography
 at 
Coursera 
Overview

Duration

20 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Introduction to Applied Cryptography
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Introduction to Applied Cryptography
 at 
Coursera 
Course details

More about this course
  • This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency
  • In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today
  • You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings
  • You will also explore the wider infrastructure surrounding cryptography and how this impacts the overall security of systems deploying cryptography

Introduction to Applied Cryptography
 at 
Coursera 
Curriculum

Introduction to the course and the Cryptographic Toolkit

Introduction to the course

How to setup a study journal

Introduction to cryptography

Physical world security services

Core services

Week 1 summary

Course syllabus

Starting your studies

Everyday cryptography: fundamental principles and applications by Keith Martyn

First thoughts on cryptography

Risks to information

Security services

Relationship between services

Cryptographic terminology

Activity: Identifying algorithms

Reflection

Stealing data

Cryptography and availability

Week 1 test

Applications of Cryptography

Introduction to applications of cryptography

Introduction to the Big Six

Wi-Fi services

Week 2 summary

Case study: Supporting mobile call protection

Reflection

Week 2 test

Cryptosystems

Introduction to cryptosystems

Algorithms and keys

How different types of cryptosystem are used

Week 3 summary

Model of a cryptosystem

Two types of cryptosystem

Reflection

Is this a cryptosystem?

Navajo code talker

Week 3 test

Attacking Cryptosystems

Introduction to attacking cryptosystems

Points of weakness

Two worlds

Week 4 summary

Course summary

Security assumptions

Exhaustive key search

Activity: Large numbers

Key lengths

Classes of attack

Latest thoughts on cryptography

Reflection

Kerckhoff assumptions

Public v proprietary

Practicalities of key search

DES and AES key searches

Week 4 test

Introduction to Applied Cryptography
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Introduction to Applied Cryptography
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...