• No products in the cart.

Cryptography is the art of writing and solving codes. This method has been used for a long time to share secret or private information between two parties for security reasons.

Cryptography is now also being used for data integrity, authentication or more complex security requirements. It is mainly a mathematical technique for securing information and sharing them. This is a very interesting course and you will enjoy all the techniques that will be taught to you.

### Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

### Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

• Show it to prove your success

Course Credit: University of Maryland

### Course Curriculum

 Module 01 cryptography – Course Overview 00:07:00 cryptography – Introduction 00:10:00 cryptography – Introduction Continued 00:08:00 cryptography – Hex and ASCII 00:11:00 cryptography – Breaking the Vigenere Cipher 00:24:00 cryptography – Principles of Modern Cryptography 00:10:00 cryptography – Perfect Secrecy 00:09:00 cryptography – Perfect Secrecy Part II 00:31:00 cryptography – The One Time Pad 00:12:00 cryptography – Implementing the One Time Pad 00:19:00 cryptography – Limitations of the One Time Pad 00:16:00 Module 02 cryptography – Computational Secrecy 00:14:00 cryptography – Computational Secrecy Part II 00:21:00 cryptography – Pseudorandomness 00:14:00 cryptography – Pseudorandom Generators 00:12:00 cryptography – The Pseudo One Time Pad 00:07:00 cryptography – Proofs of Security 00:25:00 cryptography – Stronger Security Notions 00:14:00 cryptography – Pseudorandom Functions and Block Ciphers 00:20:00 cryptography – CPA Secure Encryption from PRFs Block Ciphers 00:18:00 cryptography – Modes of Encryption 00:15:00 cryptography – Security Against Chosen Ciphertext Attacks 00:17:00 cryptography – Padding Oracle Attacks 00:17:00 cryptography – Message Integrity 00:16:00 Module 03 cryptography – A Fixed Length MAC 00:08:00 cryptography – CBC MAC 00:07:00 cryptography – Hash Functions 00:14:00 cryptography – HMAC 00:11:00 cryptography – Authenticated Encryption 00:08:00 cryptography – Secure Communication Sessions 00:08:00 cryptography – Number Theory One 00:17:00 cryptography – Number Theory Two 00:26:00 cryptography – Number Theory Three 00:15:00 cryptography – Number Theory Four 00:19:00 cryptography – Number Theory Five 00:12:00 cryptography – The Public Key Revolution 00:16:00 cryptography – Diffie Hellman Key Exchange 00:09:00 cryptography – The Public Key Revolution Part II 00:11:00 Module 04 cryptography – Public Key Encryption 00:15:00 cryptography – Discrete Log Based Public Key Encryption 00:13:00 cryptography – RSA Based Public Key Encryption 00:12:00 cryptography – Digital Signatures 00:14:00 cryptography – Digital Signatures Part II 00:10:00 cryptography – RSA Based Signatures 00:14:00 cryptography – Identification Schemes 00:22:00 cryptography – Public Key Infrastructure PKI 00:14:00 cryptography – Putting It All Together SSL TLS 00:12:00 cryptography – Parting Thoughts 00:10:00 Assessment Submit Your Assignment 00:00:00 Certification 00:00:00

## 4.7

4.7
9 ratings
• 5 stars0
• 4 stars0
• 3 stars0
• 2 stars0
• 1 stars0

No Reviews found for this course.

5 STUDENTS ENROLLED