

University of Colorado Boulder - Classical Cryptosystems and Core Concepts
- Offered byCoursera
- Public/Government Institute
Classical Cryptosystems and Core Concepts at Coursera Overview
Duration | 12 hours |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Classical Cryptosystems and Core Concepts at Coursera Highlights
- 50% started a new career after completing these courses.
- 50% got a tangible career benefit from this course.
- Earn a shareable certificate upon completion.
Classical Cryptosystems and Core Concepts at Coursera Course details
- Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today?s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world?s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Classical Cryptosystems and Core Concepts at Coursera Curriculum
Specialization Introduction
About the Instructors
Course Introduction
About the Instructor
About the Course
About the Instructor
What is Cryptography?
Codes and Ciphers
What is Cryptanalysis?
Modern Guiding Principles in Cryptography
Lecture Slide - What is Cryptography?
Additional Reference Material
Lecture Slide - Codes and Ciphers
L2: Additional Reference Material
Lecture Slide - What is Cryptanalysis
L3: Additional Reference Material
Lecture Slide - Modern Guiding Principles
L4: Additional Reference Material
Video - Cryptography for the masses: Nadim Kobeissi
Practice Assessment - Cryptographic Tidbits
Graded Assessment - Cryptographic Tidbits
Cryptanalysis
Types of Cryptanalytic Attacks
Frequency Analysis of Monoalphabetic Ciphers
Multi-Character Frequency Analysis
Frequency Analysis of Monoalphabetic Ciphers - Example
Key Length Determination in Polyalphabetic Ciphers
Example of Cracking a Vigenere Cipher
Lecture Slide - Types of Cryptanalytic Attacks
Video - Why the NSA is breaking our encryption -- and why we should care
Matthew Green
L5: Additional Reference Material
Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies
L6: Additional Reference Material
Lecture Slide - Multi-Character Frequencies Analysis
Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example
L8: Additional Reference Material
Lecture Slide - Key Length Determination in Polyalphabetic Ciphers
L9: Additional Reference Material
Lecture Slide - Example of Cracking a Vigenere Cipher
Practice Assessment - Cryptanalysis
Graded Assessment - Cryptanalysis
Hash Functions
What is a Hash Function?
How are Cryptographic Hash Function used
How are Cryptographic Hash Functions Attacked? Part I
How are Cryptographic Hash Function Attacked? Part II
Properties of a Cryptographic Hash Function
Lecture Slide - What is a Hash Function?
L11: Additional Reference Material
Lecture Slide - How are Cryptographic Hash Functions Used?
Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I
L13: Additional Reference Material
Lecture Slide - How are Cryptographic Hash Function Attacked? Part II
L14: Additional Reference Material
Lecture Slide - What Properties Should a Cryptographic Hash Function Have?
Practice Assessment - Hash Functions
Graded Assessment - Hash Functions
Other courses offered by Coursera
Student Forum
Useful Links
Know more about Coursera
Know more about Programs
- Engineering
- Instrumentation Technology
- Food Technology
- BTech Chemical Engineering
- Aeronautical Engineering
- AI & ML Courses
- BTech Petroleum Engineering
- Metallurgical Engineering
- MTech in Computer Science Engineering
- VLSI Design
- Petroleum Engineering
- BTech Robotics Engineering
- Aerospace Engineering
- BTech in Biotechnology Engineering
- BTech Mechatronics Engineering