Coursera
Coursera Logo

Introduction to Applied Cryptography 

  • Offered byCoursera
  • Public/Government Institute

Introduction to Applied Cryptography
 at 
Coursera 
Overview

Duration

20 hours

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Introduction to Applied Cryptography
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum

Introduction to Applied Cryptography
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Introduction to Applied Cryptography
 at 
Coursera 
Course details

More about this course
  • This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency
  • In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today
  • You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings
  • You will also explore the wider infrastructure surrounding cryptography and how this impacts the overall security of systems deploying cryptography

Introduction to Applied Cryptography
 at 
Coursera 
Curriculum

Introduction to the course and the Cryptographic Toolkit

Introduction to the course

How to setup a study journal

Introduction to cryptography

Physical world security services

Core services

Week 1 summary

Course syllabus

Starting your studies

Everyday cryptography: fundamental principles and applications by Keith Martyn

First thoughts on cryptography

Risks to information

Security services

Relationship between services

Cryptographic terminology

Activity: Identifying algorithms

Reflection

Stealing data

Cryptography and availability

Week 1 test

Applications of Cryptography

Introduction to applications of cryptography

Introduction to the Big Six

Wi-Fi services

Week 2 summary

Case study: Supporting mobile call protection

Reflection

Week 2 test

Cryptosystems

Introduction to cryptosystems

Algorithms and keys

How different types of cryptosystem are used

Week 3 summary

Model of a cryptosystem

Two types of cryptosystem

Reflection

Is this a cryptosystem?

Navajo code talker

Week 3 test

Attacking Cryptosystems

Introduction to attacking cryptosystems

Points of weakness

Two worlds

Week 4 summary

Course summary

Security assumptions

Exhaustive key search

Activity: Large numbers

Key lengths

Classes of attack

Latest thoughts on cryptography

Reflection

Kerckhoff assumptions

Public v proprietary

Practicalities of key search

DES and AES key searches

Week 4 test

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6726 CoursesRight Arrow Icon
qna

Introduction to Applied Cryptography
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...