MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.
What You Will Learn
Lesson 1
Perfect Ciphers
- What makes certain ciphers perfect.
- How the Lorenz Cipher was broken.
Lesson 2
Symmetric Encryption
- Sending messages when two people share a secret.
Lesson 3
Key Exchange
- Techniques to establish a shared secret.
Lesson 4
Asymmetric Encryption
- Exchanging information using public key cryptosystems.
Lesson 5
Public Key Protocols
- Encrypted key exchange
- certificates
- secure commerce.
Lesson 6
Using Cryptographic Primitives
- How cryptography can be useful for anonymizing communication
- voting
- and digital cash.
Lesson 7
Secure Computation
- Computing without exposing data.
Prerequisites and Requirements
This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.