University of Colorado Boulder - Symmetric Cryptography
- Offered byCoursera
Symmetric Cryptography at Coursera Overview
Duration | 13 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Symmetric Cryptography at Coursera Highlights
- This Course Plus the Full Specialization.
- Shareable Certificates.
- Graded Programming Assignments.
Symmetric Cryptography at Coursera Course details
- Welcome to Symmetric Cryptography!
- Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes.
- This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.
Symmetric Cryptography at Coursera Curriculum
Classical Cipher: Substitution
Instructor Introduction
Module Objectives
Alphabet
Substitution and Caesar Cipher
Modulo Operation
Monoalphabetic Cipher
Natural Language Redundancy
Polyalphabetic Cipher and Vigenere Cipher
Lecture Slides for Classical Cipher - Substitution
About Pseudocode
Caesar Cipher
Modulo Operation and Caesar Cipher
Vigenere Cipher
Classical Cipher: Transposition
Module Objectives
Rail Fence Cipher
Permutation Cipher
Permutation Cipher Security
Product Cipher
Lecture Slides for Classical Cipher - Transposition
Rail Fence Cipher and Permutation Cipher
Product Cipher
Block Cipher and DES
Modern Cipher and Module Objectives
Block Cipher vs. Stream Cipher
Ideal Block Cipher
Feistel Cipher
DES Overview
DES Round Function
DES Subkey Generation
DES Security
About Pseudocode
Lecture Slides for Block Cipher and DES
Ideal Block Cipher
DES
3-DES and AES
Module Ojectives
Double-DES and Meet-in-the-Middle Attack
Triple DES
Advanced Encryption Standard (AES)
Lecture Slides for 3-DES and AES
Symmetric Algorithm Survey
3-DES and 4-DES
AES
Block Cipher Operation Modes
Module Objectives
Electronic Codebook (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)
Lecture Slides for Block Cipher Operation Modes
Block Cipher Operation Modes