Coursera
Lista de cursos
  • Navegar
  • Pesquisar
  • For Enterprise
  • Entrar
  • Criar conta

Classical Cryptosystems and Core Concepts

Visão geralProgramaPerguntas frequentesDesenvolvedoresCustoClassificações e avaliações

Página inicialCiência da ComputaçãoSegurança de Redes e Computadores

Classical Cryptosystems and Core Concepts

University of Colorado System

Informações sobre o curso: Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.

Para quem é direcionado este curso: Learners with CS experience or education looking to: ○ Enhance/refresh critical skills; ○ Seeking to expand their opportunities. Learners undecided about pursuing a bachelor’s degree: ○ Seeking professional credit that may be applied towards a bachelor’s degree.


Desenvolvido por:  University of Colorado System
University of Colorado System

  • William Bahn

    Ministrado por:  William Bahn, Lecturer

    Computer Science

  • Richard White

    Ministrado por:  Richard White, Assistant Research Professor

    Computer Science

  • Sang-Yoon Chang

    Ministrado por:  Sang-Yoon Chang, Assistant Professor

    Computer Science
Informações básicas
Curso 1 de 4 no Introduction to Applied Cryptography Specialization
NívelBeginner
CompromissoThis is Course 1 in a 4-course specialization. Estimated workload: 15-hours per week.
Idioma
English
Como ser aprovadoSeja aprovado em todas as tarefas para concluir o curso.
Classificação do usuário
4.6 estrelas
Classificação média do usuário 4.6Veja o que os aprendizes disseram
Programa
SEMANA 1
Specialization Introduction
This module covers an introduction of the specialization and instructors, covers what to expect from this educational experience and also, an introduction to the course Classical Cryptosystems and Core Concepts.
3 vídeos, 2 leituras
  1. Vídeo: About the Instructors
  2. Vídeo: Course Introduction
  3. Reading: About the Course
  4. Vídeo: About the Instructor
  5. Reading: About the Instructor
Cryptographic Tidbits
In this module we present an introduction to cryptography, differentiate between codes and ciphers, describe cryptanalysis, and identify the guiding principles of modern cryptography. After completing this course you will be able to read material related to cryptographic systems, understanding the basic terminology and concepts. You will also have an appreciation for the historical framework of modern cryptography and the difficulty of achieving its aims.
4 vídeos, 9 leituras, 1 questionário de prática
  1. Vídeo: What is Cryptography?
  2. Reading: Lecture Slide - What is Cryptography?
  3. Reading: Additional Reference Material
  4. Vídeo: Codes and Ciphers
  5. Reading: Lecture Slide - Codes and Ciphers
  6. Reading: L2: Additional Reference Material
  7. Vídeo: What is Cryptanalysis?
  8. Reading: Lecture Slide - What is Cryptanalysis
  9. Reading: L3: Additional Reference Material
  10. Vídeo: Modern Guiding Principles in Cryptography
  11. Reading: Lecture Slide - Modern Guiding Principles
  12. Reading: L4: Additional Reference Material
  13. Reading: Video - Cryptography for the masses: Nadim Kobeissi
  14. Practice Quiz: Practice Assessment - Cryptographic Tidbits
  15. Discussion Prompt: What do you think?
Nota atribuída: Graded Assessment - Cryptographic Tidbits
SEMANA 2
Cryptanalysis
Delving deeper into cryptanalysis, in this module we will discuss different types of attacks, explain frequency analysis and different use cases, explain the significance of polyalphabetical ciphers, and discuss the Vigenere Cipher. When you have completed this module, you will have an appreciation of the different types of attacks and under what kinds of situations each might be applicable.
6 vídeos, 11 leituras, 1 questionário de prática
  1. Vídeo: Types of Cryptanalytic Attacks
  2. Reading: Lecture Slide - Types of Cryptanalytic Attacks
  3. Reading: Video - Why the NSA is breaking our encryption -- and why we should care | Matthew Green
  4. Reading: L5: Additional Reference Material
  5. Vídeo: Frequency Analysis of Monoalphabetic Ciphers
  6. Reading: Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies
  7. Reading: L6: Additional Reference Material
  8. Vídeo: Multi-Character Frequency Analysis
  9. Reading: Lecture Slide - Multi-Character Frequencies Analysis
  10. Vídeo: Frequency Analysis of Monoalphabetic Ciphers - Example
  11. Reading: Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example
  12. Reading: L8: Additional Reference Material
  13. Vídeo: Key Length Determination in Polyalphabetic Ciphers
  14. Reading: Lecture Slide - Key Length Determination in Polyalphabetic Ciphers
  15. Reading: L9: Additional Reference Material
  16. Vídeo: Example of Cracking a Vigenere Cipher
  17. Reading: Lecture Slide - Example of Cracking a Vigenere Cipher
  18. Practice Quiz: Practice Assessment - Cryptanalysis
  19. Discussion Prompt: What do you think?
Nota atribuída: Graded Assessment - Cryptanalysis
SEMANA 3
Hash Functions
Continuing on our exploration of the fundamental concept of cryptography, this module will explain the Hash Function, its purpose and application, potential attack vectors, and the importance of hash functions on cryptographic design. Upon completion you will be able to understand the role that hash functions play in cryptography and how cryptographic hash functions differ from other types of hash functions.
5 vídeos, 8 leituras, 1 questionário de prática
  1. Vídeo: What is a Hash Function?
  2. Reading: Lecture Slide - What is a Hash Function?
  3. Reading: L11: Additional Reference Material
  4. Vídeo: How are Cryptographic Hash Function used
  5. Reading: Lecture Slide - How are Cryptographic Hash Functions Used?
  6. Vídeo: How are Cryptographic Hash Functions Attacked? Part I
  7. Reading: Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I
  8. Reading: L13: Additional Reference Material
  9. Vídeo: How are Cryptographic Hash Function Attacked? Part II
  10. Reading: Lecture Slide - How are Cryptographic Hash Function Attacked? Part II
  11. Reading: L14: Additional Reference Material
  12. Vídeo: Properties of a Cryptographic Hash Function
  13. Reading: Lecture Slide - What Properties Should a Cryptographic Hash Function Have?
  14. Practice Quiz: Practice Assessment - Hash Functions
  15. Discussion Prompt: What do you think?
Nota atribuída: Graded Assessment - Hash Functions

Perguntas frequentes
Como funciona
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

Desenvolvedores
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Custo
Comprar curso
Acesso aos materiais do curso

Disponível

Acesso a materiais valendo nota

Disponível

Receba uma nota final

Disponível

Obtenha um Certificado de Curso compartilhável

Disponível

Classificações e avaliações
Avaliado em 4.6 de 5 decorrente de 39 avaliações

AS

Introduction intéressante et complète aux principes et systèmes essentiels de la cryptographie.

AM

Very good introduction course with great supplementary materials and examples

ME

Excellent introductory course

Jai Verma

Cover every little details of Cryptography specially hash functions



Talvez você também goste de
University of Colorado System
Symmetric Cryptography
1 curso
University of Colorado System
Symmetric Cryptography
Visualizar curso
University of Colorado System
Asymmetric Cryptography and Key Management
1 curso
University of Colorado System
Asymmetric Cryptography and Key Management
Visualizar curso
University of Colorado System
Cryptographic Hash and Integrity Protection
1 curso
University of Colorado System
Cryptographic Hash and Integrity Protection
Visualizar curso
University of Colorado System
Mathematical Foundations for Cryptography
1 curso
University of Colorado System
Mathematical Foundations for Cryptography
Visualizar curso
University of Colorado System
Cryptography and Information Theory
1 curso
University of Colorado System
Cryptography and Information Theory
Visualizar curso
Coursera
O Coursera proporciona acesso universal à melhor educação do mundo fazendo parcerias com as melhores universidades e organizações para oferecer cursos on-line.
© 2018 Coursera Inc. Todos os direitos reservados.
Baixar na App StoreBaixar no Google Play
  • Coursera
  • Sobre
  • Liderança
  • Carreiras
  • Lista de cursos
  • Certificados
  • Notas
  • Para negócios
  • For Government
  • Comunidade
  • parceiros
  • Orientadores
  • Tradutores
  • Desenvolvedores
  • Testadores beta
  • Conectar
  • Blog
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Tech Blog
  • Mais
  • Termos
  • Privacidade
  • Ajuda
  • Acessibilidade
  • Imprensa
  • Contato
  • Diretório
  • Afiliados