Learn cryptographic systems: from basic ciphers to public-key encryption. Explore security definitions and real-world applications.
Learn cryptographic systems: from basic ciphers to public-key encryption. Explore security definitions and real-world applications.
This course provides a comprehensive introduction to cryptography, covering both symmetric and public-key techniques. Students will learn about stream ciphers, block ciphers, message integrity, authenticated encryption, and basic key exchange. The curriculum includes an in-depth exploration of cryptographic primitives, security definitions, and their applications in real-world systems. The course also touches on computational number theory and its relevance to public-key cryptography. Designed for those with a basic understanding of computer science, it offers a mix of theoretical concepts and practical applications.
4.8
(4,282 ratings)
5,06,005 already enrolled
Instructors:
English
پښتو, বাংলা, اردو, 3 more
What you'll learn
Understand the basic principles of cryptography and its applications
Analyze and implement symmetric-key encryption algorithms
Explore message integrity techniques and MAC constructions
Understand authenticated encryption and its importance in secure communications
Learn the fundamentals of public-key cryptography and key exchange protocols
Implement and analyze basic public-key encryption systems
Skills you'll gain
This course includes:
23 Hours PreRecorded video
13 quizzes
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.
There are 7 modules in this course
This course offers a comprehensive introduction to cryptography, covering both theoretical foundations and practical applications. The curriculum is divided into six main modules, each focusing on a key aspect of cryptographic systems. Students begin with an overview of cryptography and basic stream ciphers, then progress to block ciphers, message integrity, and authenticated encryption. The latter half of the course introduces public-key cryptography, including basic key exchange protocols and public-key encryption systems. Throughout the course, students are exposed to security definitions, cryptographic attacks, and the mathematical underpinnings of modern cryptography. The course emphasizes the correct use of cryptographic primitives in real-world applications and includes optional programming projects to reinforce learning.
Course overview and stream ciphers
Module 1 · 4 Hours to complete
Block Ciphers
Module 2 · 3 Hours to complete
Message Integrity
Module 3 · 3 Hours to complete
Authenticated Encryption
Module 4 · 3 Hours to complete
Basic Key Exchange
Module 5 · 3 Hours to complete
Public-Key Encryption
Module 6 · 3 Hours to complete
Final exam
Module 7 · 30 Minutes to complete
Fee Structure
Payment options
Financial Aid
Instructor
Leading Expert in Applied Cryptography
Professor Dan Boneh leads the applied cryptography group in the Computer Science department at Stanford University, where he focuses on the intersection of cryptography and computer security. His research encompasses a variety of areas, including cryptosystems with innovative properties, web security, mobile device security, digital copyright protection, and cryptanalysis. With over a hundred publications to his name, Professor Boneh has received several prestigious awards, including the Packard Award, the Alfred P. Sloan Award, the RSA Award in Mathematics, and most recently, the Ishii Award for industry education innovation. He earned his Ph.D. from Princeton University and has been a part of Stanford since 1997.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.8 course rating
4,282 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.