You must be logged in to take this course → LOGIN | REGISTER NOW
Cryptography is the art of writing and solving codes. This method has been used for a long time to share secret or private information between two parties for security reasons.
Cryptography is now also being used for data integrity, authentication or more complex security requirements. It is mainly a mathematical technique for securing information and sharing them. This is a very interesting course and you will enjoy all the techniques that will be taught to you.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: University of Maryland
Course Curriculum
Module 01 | |||
cryptography – Course Overview | 00:07:00 | ||
cryptography – Introduction | 00:10:00 | ||
cryptography – Introduction Continued | 00:08:00 | ||
cryptography – Hex and ASCII | 00:11:00 | ||
cryptography – Breaking the Vigenere Cipher | 00:24:00 | ||
cryptography – Principles of Modern Cryptography | 00:10:00 | ||
cryptography – Perfect Secrecy | 00:09:00 | ||
cryptography – Perfect Secrecy Part II | 00:31:00 | ||
cryptography – The One Time Pad | 00:12:00 | ||
cryptography – Implementing the One Time Pad | 00:19:00 | ||
cryptography – Limitations of the One Time Pad | 00:16:00 | ||
Module 02 | |||
cryptography – Computational Secrecy | 00:14:00 | ||
cryptography – Computational Secrecy Part II | 00:21:00 | ||
cryptography – Pseudorandomness | 00:14:00 | ||
cryptography – Pseudorandom Generators | 00:12:00 | ||
cryptography – The Pseudo One Time Pad | 00:07:00 | ||
cryptography – Proofs of Security | 00:25:00 | ||
cryptography – Stronger Security Notions | 00:14:00 | ||
cryptography – Pseudorandom Functions and Block Ciphers | 00:20:00 | ||
cryptography – CPA Secure Encryption from PRFs Block Ciphers | 00:18:00 | ||
cryptography – Modes of Encryption | 00:15:00 | ||
cryptography – Security Against Chosen Ciphertext Attacks | 00:17:00 | ||
cryptography – Padding Oracle Attacks | 00:17:00 | ||
cryptography – Message Integrity | 00:16:00 | ||
Module 03 | |||
cryptography – A Fixed Length MAC | 00:08:00 | ||
cryptography – CBC MAC | 00:07:00 | ||
cryptography – Hash Functions | 00:14:00 | ||
cryptography – HMAC | 00:11:00 | ||
cryptography – Authenticated Encryption | 00:08:00 | ||
cryptography – Secure Communication Sessions | 00:08:00 | ||
cryptography – Number Theory One | 00:17:00 | ||
cryptography – Number Theory Two | 00:26:00 | ||
cryptography – Number Theory Three | 00:15:00 | ||
cryptography – Number Theory Four | 00:19:00 | ||
cryptography – Number Theory Five | 00:12:00 | ||
cryptography – The Public Key Revolution | 00:16:00 | ||
cryptography – Diffie Hellman Key Exchange | 00:09:00 | ||
cryptography – The Public Key Revolution Part II | 00:11:00 | ||
Module 04 | |||
cryptography – Public Key Encryption | 00:15:00 | ||
cryptography – Discrete Log Based Public Key Encryption | 00:13:00 | ||
cryptography – RSA Based Public Key Encryption | 00:12:00 | ||
cryptography – Digital Signatures | 00:14:00 | ||
cryptography – Digital Signatures Part II | 00:10:00 | ||
cryptography – RSA Based Signatures | 00:14:00 | ||
cryptography – Identification Schemes | 00:22:00 | ||
cryptography – Public Key Infrastructure PKI | 00:14:00 | ||
cryptography – Putting It All Together SSL TLS | 00:12:00 | ||
cryptography – Parting Thoughts | 00:10:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.