Informações sobre o curso
4.2
48 classificações
11 avaliações
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses. This course is a part of the Applied Cryptography specialization....
Globe

cursos 100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Calendar

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Intermediate Level

Nível intermediário

Clock

Approx. 7 hours to complete

Sugerido: 2-4 hours/week...
Comment Dots

English

Legendas: English...
Globe

cursos 100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Calendar

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Intermediate Level

Nível intermediário

Clock

Approx. 7 hours to complete

Sugerido: 2-4 hours/week...
Comment Dots

English

Legendas: English...

Programa - O que você aprenderá com este curso

Week
1
Clock
2 horas para concluir

Cryptography Overview

This module defines the technical terms in cryptography and introduce Alice, Bob, and Eve. To study the attacker Eve's perspective, we will describe Kerckhoff's Principle ("the attacker knows the system"), which defines the scope of the attacker knowledge (what is secret vs. what the attacker can know). We will also describe Security by Obscurity, which contrasts Kerckhoff's Principle. ...
Reading
8 vídeos (Total de 19 min), 1 leitura, 2 testes
Video8 videos
Module Objectives1min
Alice, Bob, and Eve1min
Cryptography Terminology2min
Threat Model and the Attacker Knowledge1min
Kerckhoff's Principle3min
Security by Obscurity and Steganography, Part 12min
Security by Obscurity and Steganography, Part 21min
Reading1 leituras
Slides for Cryptography Overview20min
Quiz1 exercício prático
Kerckhoff's Principle and Security by Obscurity30min
Week
2
Clock
2 horas para concluir

Information Entropy

This module studies information entropy to quantify randomness. Information entropy can be used to measure the strength of the key or the secret information that determines the security of a cryptosystem against an attacker who does not know the random key. ...
Reading
6 vídeos (Total de 44 min), 1 leitura, 2 testes
Video6 videos
Deterministic vs. Random4min
Information Entropy5min
Entropy: Uniform Distribution Case9min
Entropy: General Distribution Case13min
Entropy Recap9min
Reading1 leituras
Slides for Information Entropy20min
Quiz2 exercícios práticos
Throwing a Dice15min
Entropy: Balls in a Bin35min
Week
3
Clock
1 hora para concluir

Brute-Force Attack and Cryptanalysis

This module studies the attacker view whose objective is to learn the key and break the cryptographic protection using the key. First, we will define brute force attack and describe how to quantify the attacker effort for brute force attack. Next, we will contrast cryptanalysis and brute force attack. Lastly, we will discuss about perfect secrecy, which is immune to cryptanalysis and is a strong notion of security derived from information theory. ...
Reading
4 vídeos (Total de 13 min), 1 leitura, 1 teste
Video4 videos
Brute Force Attack3min
Cryptanalysis5min
Perfect Secrecy and One-Time Pad3min
Reading1 leituras
Lecture Slides for Brute Force and Cryptanalysis20min
Quiz1 exercício prático
Brute-Force Attack, Cryptanalysis, and One-Time Pad30min
Week
4
Clock
2 horas para concluir

Computational Security and Side-Channel Attack

This module studies cryptography from the practical point of view. We will first define computational security, which relies on the fact that real world attackers are computationally limited unlike information theoretic security, e.g., one-time pad. We will then survey side channel attacks and unintentional information leakage from the physical implementations of cryptosystems. ...
Reading
3 vídeos (Total de 12 min), 2 leituras
Video3 videos
Computational Security: Attacker's Computational Bound6min
Side-Channel Attack4min
Reading2 leituras
Lecture Slides for Computational Security and Side Channel Attacks20min
Reading on physical side-channel attacks10min
4.2
Briefcase

83%

consegui um benefício significativo de carreira com este curso

Melhores avaliações

por SDJan 14th 2018

This is fabulous course that i found, great assignment and questions make this course course worth full.

Instrutores

Sang-Yoon Chang

Assistant Professor
Computer Science

Sobre University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Sobre o Programa de cursos integrados Applied Cryptography

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols....
Applied Cryptography

Perguntas Frequentes – FAQ

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.