Applied Cryptography

Course Cover
compare button icon
Offer Percent Icon

2 Coupons Available

Login To View All

Course Features

icon

Duration

2 months

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

Course Description

Cryptography is present in everyday life from paying with a credit card to using the telephone Learn all about making and breaking puzzles in computing

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis

What You Will Learn

Perfect CiphersWhat makes certain ciphers perfectHow the Lorenz Cipher was broken

Symmetric EncryptionSending messages when two people share a secret

Key ExchangeTechniques to establish a shared secret

Asymmetric EncryptionExchanging information using public key cryptosystems

Public Key ProtocolsEncrypted key exchange, certificates, secure commerce

Using Cryptographic PrimitivesHow cryptography can be useful for anonymizing communication, voting, and digital cash

Secure ComputationComputing without exposing data

Course Instructors

Dave Evans

Instructor

Instructor
Course Cover
Offer Percent Icon

2 Coupons Available
Get upto 40% Discount