Cryptography-Cryptography is essentially the science of writing in secret code.

Cryptography is essentially the science of writing in secret code.

Cryptography

Cryptography is essentially the science of writing in secret code.

A brief summary

Content Provided By Saylor.

Course outline and learning outcomes provided by Saylor Academy (Saylor.org), under a CC-BY Creative Commons 3.0 License.

Cryptography is essentially the science of writing in secret code.  In data and telecommunications, cryptography has specific security requirements, such as authentication, privacy or confidentiality, integrity, and non-repudiation.  To meet these security requirements, we employ secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.

Instructor:

Saylor

What you will learn

Introduction into CryptographyClassical Cryptography
Block CiphersHash Functions
The RSA Cryptosystem and Factoring IntegersElliptic Curve Cryptography
Digital Signature and Entity Authentication


Course Fee: Free

Certification By: Millionlights

Introduction into Cryptography

Introduction, History of Cryptography, Basics of Information Theory, Basic Cryptanalysis, Alice and Bob Go to Washington: A Cryptographic Theory of Politics and Policy, Stats in Code

Classical Cryptography, Block Ciphers

Classical Ciphers and Their Cryptanalysis, Mechanical Ciphers, Ciphers in Code, Block Ciphers, Substitution-permutation Network, Data Encryption Standard, Advanced Encryption Standard, Abstraction in Cryptography

Hash Functions, The RSA Cryptosystem and Factoring Integers

Cryptographic Hash Functions, Cryptographic Hashing Function in Code, The RSA Cryptosystem and Factoring Integers, Math Background, Prime Factorization Algorithms (More Math), Miller-Rabin Primality Test in Code

Elliptic Curve Cryptography

Elliptic Curve Cryptograph, Elliptic Curves

Digital Signature and Entity Authentication

Digital Signature and Entity Authentication, Key Exchange, Discrete Logarithm, The ElGamal Signature Schemes, Autokey Identity SchemesPublic Key Infrastructure, Cryptography - Science or Magic?

Back to top