Applied Cryptography

Level

Applied Cryptography

Udacity
Logo Udacity

Need more information? Get more details on the site of the provider.

Starting dates and places

This product does not have fixed starting dates and/or places.

Description

Science of Secrets

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles…

Class Summary

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

What Should I Know?

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

What Will I Learn?

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented ba…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: CISSP, IT Security, Business Information Systems, Security, and CompTIA A+ / Network+ / Security+.

Science of Secrets

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles…

Class Summary

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

What Should I Know?

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

What Will I Learn?

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

Syllabus

Unit 1: Perfect Ciphers

What makes certain ciphers perfect, how the Lorenz Cipher was broken

Unit 2: Symmetric Encryption

Sending messages when two people share a secret

Unit 3: Key Exchange

Technics to establish a shared secret

Unit 4: Asymmetric Encryption

Exchanging information using public key cryptosystems

Unit 5: Public Key Protocols

Encrypted key exchange, certificates, secure commerce

Unit 6: Using Cryptographic Primitives

How cryptography can be useful for anonymizing communication, voting, and digital cash

Unit 7: Secure Computation

Computing without exposing data

Course Instructors

David Evans Instructor

David Evans is a Professor of Computer Science at the University of Virginia where he teaches computer science and leads research in computer security. He is the author of an introductory computer science textbook and has won Virginia's highest award for university faculty. He has PhD, SM, and SB degrees from MIT.

Shayan Doroudi Assistant Instructor

While Shayan's technically studying computer science at Caltech, his diverse range of interests have led him to undertake a variety of projects including modeling the fungibility of foreign aid, studying kidney exchanges, making robots out of DNA, and most recently helping Udacity educate thousands of students worldwide.

There are no reviews yet.

    Share your review

    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.