Applied Cryptography
Starting dates and places
This product does not have fixed starting dates and/or places.
Description
Science of Secrets
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles…
Class Summary
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
What Should I Know?
This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.
What Will I Learn?
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented ba…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Science of Secrets
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles…
Class Summary
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
What Should I Know?
This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.
What Will I Learn?
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.
Syllabus
Unit 1: Perfect Ciphers
What makes certain ciphers perfect, how the Lorenz Cipher was broken
Unit 2: Symmetric Encryption
Sending messages when two people share a secret
Unit 3: Key Exchange
Technics to establish a shared secret
Unit 4: Asymmetric Encryption
Exchanging information using public key cryptosystems
Unit 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerce
Unit 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cash
Unit 7: Secure Computation
Computing without exposing data
Course Instructors
David Evans InstructorDavid Evans is a Professor of Computer Science at the University of Virginia where he teaches computer science and leads research in computer security. He is the author of an introductory computer science textbook and has won Virginia's highest award for university faculty. He has PhD, SM, and SB degrees from MIT.
Shayan Doroudi Assistant InstructorWhile Shayan's technically studying computer science at Caltech, his diverse range of interests have led him to undertake a variety of projects including modeling the fungibility of foreign aid, studying kidney exchanges, making robots out of DNA, and most recently helping Udacity educate thousands of students worldwide.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.