Applied Cryptography
Offered By: University of Virginia via Udacity
Course Description
Overview
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Syllabus
- Perfect Ciphers
- What makes certain ciphers perfect.,How the Lorenz Cipher was broken.
- Symmetric Encryption
- Sending messages when two people share a secret.
- Key Exchange
- Techniques to establish a shared secret.
- Asymmetric Encryption
- Exchanging information using public key cryptosystems.
- Public Key Protocols
- Encrypted key exchange, certificates, secure commerce.
- Using Cryptographic Primitives
- How cryptography can be useful for anonymizing communication, voting, and digital cash.
- Secure Computation
- Computing without exposing data.
Taught by
David Evans
Tags
Related Courses
Scenario Based LXD/LXC SecurityA Cloud Guru Application : se préparer aux métiers de la cybersécurité
Google via Coursera Approfondimento sulla sicurezza dei container (Italiano) | Deep Dive on Container Security (Italian)
Amazon Web Services via AWS Skill Builder AWS IoT Security Primer (Indonesian)
Amazon Web Services via AWS Skill Builder AWS IoT Security Primer (Italian)
Amazon Web Services via AWS Skill Builder