Coursera
Coursera Logo

University of Colorado Boulder - Classical Cryptosystems and Core Concepts 

  • Offered byCoursera
  • Public/Government Institute

Classical Cryptosystems and Core Concepts
 at 
Coursera 
Overview

Duration

12 hours

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Classical Cryptosystems and Core Concepts
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum
  • Student Reviews

Classical Cryptosystems and Core Concepts
 at 
Coursera 
Highlights

  • 50% started a new career after completing these courses.
  • 50% got a tangible career benefit from this course.
  • Earn a shareable certificate upon completion.
Details Icon

Classical Cryptosystems and Core Concepts
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today?s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world?s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Read more

Classical Cryptosystems and Core Concepts
 at 
Coursera 
Curriculum

Specialization Introduction

About the Instructors

Course Introduction

About the Instructor

About the Course

About the Instructor

What is Cryptography?

Codes and Ciphers

What is Cryptanalysis?

Modern Guiding Principles in Cryptography

Lecture Slide - What is Cryptography?

Additional Reference Material

Lecture Slide - Codes and Ciphers

L2: Additional Reference Material

Lecture Slide - What is Cryptanalysis

L3: Additional Reference Material

Lecture Slide - Modern Guiding Principles

L4: Additional Reference Material

Video - Cryptography for the masses: Nadim Kobeissi

Practice Assessment - Cryptographic Tidbits

Graded Assessment - Cryptographic Tidbits

Cryptanalysis

Types of Cryptanalytic Attacks

Frequency Analysis of Monoalphabetic Ciphers

Multi-Character Frequency Analysis

Frequency Analysis of Monoalphabetic Ciphers - Example

Key Length Determination in Polyalphabetic Ciphers

Example of Cracking a Vigenere Cipher

Lecture Slide - Types of Cryptanalytic Attacks

Video - Why the NSA is breaking our encryption -- and why we should care

Matthew Green

L5: Additional Reference Material

Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies

L6: Additional Reference Material

Lecture Slide - Multi-Character Frequencies Analysis

Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example

L8: Additional Reference Material

Lecture Slide - Key Length Determination in Polyalphabetic Ciphers

L9: Additional Reference Material

Lecture Slide - Example of Cracking a Vigenere Cipher

Practice Assessment - Cryptanalysis

Graded Assessment - Cryptanalysis

Hash Functions

What is a Hash Function?

How are Cryptographic Hash Function used

How are Cryptographic Hash Functions Attacked? Part I

How are Cryptographic Hash Function Attacked? Part II

Properties of a Cryptographic Hash Function

Lecture Slide - What is a Hash Function?

L11: Additional Reference Material

Lecture Slide - How are Cryptographic Hash Functions Used?

Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I

L13: Additional Reference Material

Lecture Slide - How are Cryptographic Hash Function Attacked? Part II

L14: Additional Reference Material

Lecture Slide - What Properties Should a Cryptographic Hash Function Have?

Practice Assessment - Hash Functions

Graded Assessment - Hash Functions

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6726 CoursesRight Arrow Icon

Classical Cryptosystems and Core Concepts
 at 
Coursera 
Students Ratings & Reviews

4.5/5
Verified Icon2 Ratings
Y
Yashika Gupta
Classical Cryptosystems and Core Concepts
Offered by Coursera
5
Other: Ccc is a must course for everyone . I learnt a lot. I like the way of teaching.
Reviewed on 15 Mar 2021Read More
Thumbs Up IconThumbs Down Icon
A
ANAND shirol
Classical Cryptosystems and Core Concepts
Offered by Coursera
4
Other: Achieving CCNA certification is the first step in preparing for a career in IT technologies. To earn CCNA certification, you pass one exam that covers a broad range of fundamentals for IT careers, based on the latest networking technologies, software development skills, and job roles. CCNA gives you the foundation you need to take your career in any direction.
Reviewed on 15 Mar 2021Read More
Thumbs Up IconThumbs Down Icon
View All 2 ReviewsRight Arrow Icon
qna

Classical Cryptosystems and Core Concepts
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...