RiseUpp Logo
Educator Logo

Cryptography I

Learn cryptographic systems: from basic ciphers to public-key encryption. Explore security definitions and real-world applications.

Learn cryptographic systems: from basic ciphers to public-key encryption. Explore security definitions and real-world applications.

This course provides a comprehensive introduction to cryptography, covering both symmetric and public-key techniques. Students will learn about stream ciphers, block ciphers, message integrity, authenticated encryption, and basic key exchange. The curriculum includes an in-depth exploration of cryptographic primitives, security definitions, and their applications in real-world systems. The course also touches on computational number theory and its relevance to public-key cryptography. Designed for those with a basic understanding of computer science, it offers a mix of theoretical concepts and practical applications.

4.8

(4,282 ratings)

5,06,005 already enrolled

Instructors:

English

پښتو, বাংলা, اردو, 3 more

Powered by

Provider Logo
Cryptography I

This course includes

23 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

4,963

What you'll learn

  • Understand the basic principles of cryptography and its applications

  • Analyze and implement symmetric-key encryption algorithms

  • Explore message integrity techniques and MAC constructions

  • Understand authenticated encryption and its importance in secure communications

  • Learn the fundamentals of public-key cryptography and key exchange protocols

  • Implement and analyze basic public-key encryption systems

Skills you'll gain

cryptography
encryption
cryptanalysis
public-key cryptography
symmetric-key algorithms
data integrity
key exchange
number theory

This course includes:

23 Hours PreRecorded video

13 quizzes

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Provided by

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 7 modules in this course

This course offers a comprehensive introduction to cryptography, covering both theoretical foundations and practical applications. The curriculum is divided into six main modules, each focusing on a key aspect of cryptographic systems. Students begin with an overview of cryptography and basic stream ciphers, then progress to block ciphers, message integrity, and authenticated encryption. The latter half of the course introduces public-key cryptography, including basic key exchange protocols and public-key encryption systems. Throughout the course, students are exposed to security definitions, cryptographic attacks, and the mathematical underpinnings of modern cryptography. The course emphasizes the correct use of cryptographic primitives in real-world applications and includes optional programming projects to reinforce learning.

Course overview and stream ciphers

Module 1 · 4 Hours to complete

Block Ciphers

Module 2 · 3 Hours to complete

Message Integrity

Module 3 · 3 Hours to complete

Authenticated Encryption

Module 4 · 3 Hours to complete

Basic Key Exchange

Module 5 · 3 Hours to complete

Public-Key Encryption

Module 6 · 3 Hours to complete

Final exam

Module 7 · 30 Minutes to complete

Fee Structure

Payment options

Financial Aid

Instructor

Dan Boneh
Dan Boneh

4.8 rating

537 Reviews

5,05,346 Students

1 Course

Leading Expert in Applied Cryptography

Professor Dan Boneh leads the applied cryptography group in the Computer Science department at Stanford University, where he focuses on the intersection of cryptography and computer security. His research encompasses a variety of areas, including cryptosystems with innovative properties, web security, mobile device security, digital copyright protection, and cryptanalysis. With over a hundred publications to his name, Professor Boneh has received several prestigious awards, including the Packard Award, the Alfred P. Sloan Award, the RSA Award in Mathematics, and most recently, the Ishii Award for industry education innovation. He earned his Ph.D. from Princeton University and has been a part of Stanford since 1997.

Cryptography I

This course includes

23 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

4,963

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

4.8 course rating

4,282 ratings

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.