Course

Cryptography

University of Maryland, College Park

This course on Cryptography offered by University of Maryland, College Park, delves into the foundations and practical applications of modern cryptography. The course covers a range of topics including perfect secrecy, computational secrecy, pseudorandomness, encryption modes, message integrity, number theory, public-key encryption, digital signatures, and SSL/TLS.

The course comprises seven modules, each consisting of detailed video lectures, programming assignments, quizzes, and practical insights to reinforce learning.

Upon completion, students will possess a strong foundation in modern cryptography, enabling them to apply cryptographic principles to real-world scenarios and contribute to secure communication and data protection.

Certificate Available ✔

Get Started / More Info
Cryptography
Course Modules

The Cryptography course encompasses seven modules that cover foundational principles and practical applications of modern cryptography, including perfect secrecy, computational secrecy, encryption modes, public-key encryption, digital signatures, and SSL/TLS.

Week 1

This module provides an introduction to the course, covering topics such as the Vigenere Cipher, principles of modern cryptography, perfect secrecy, and the one-time pad. The module includes programming assignments and quizzes to reinforce learning.

Week 2

Module 2 explores the limitations of the one-time pad, computational secrecy, pseudorandomness, and proofs of security. It also includes programming assignments and quizzes to test understanding and application of concepts.

Week 3

Module 3 delves into stronger security notions, pseudorandom functions, block ciphers, encryption modes, and security against chosen-ciphertext attacks. Students will engage in programming assignments and quizzes to reinforce their knowledge.

Week 4

Module 4 focuses on message integrity, fixed-length MAC, CBC-MAC, hash functions, HMAC, and authenticated encryption. It also includes practical programming assignments and quizzes to reinforce learning.

Week 5

Module 5 covers number theory and its relevance to cryptography, including topics such as number theory, public-key encryption, and RSA-based public-key encryption. Students will engage with quizzes to test their understanding.

Week 6

Module 6 explores the public-key revolution, Diffie-Hellman key exchange, public-key encryption, RSA-based public-key encryption, and discrete-log-based public-key encryption. Quizzes are included to test understanding.

Week 7

Module 7 focuses on digital signatures, identification schemes, public-key infrastructure (PKI), SSL/TLS, and practical applications. Students will also complete programming assignments and quizzes to reinforce their knowledge.

More Computer Security and Networks Courses

Blockchain Revolution in Financial Services

INSEAD

Blockchain Revolution in Financial Services is a four-course specialization introducing learners to the revolutionary world of blockchain technology for financial...

Introduction to Cybersecurity & Risk Management

University of California, Irvine

Introduction to Cybersecurity & Risk Management is a case-based Specialization providing foundational concepts of security governance and risk management, focusing...

Play It Safe: Manage Security Risks

Google

Play It Safe: Manage Security Risks is a crucial course in the Google Cybersecurity Certificate program, delving deeper into risk management, security frameworks,...

Applied ChatGPT for Cybersecurity

Infosec

Applied ChatGPT for Cybersecurity is an immersive course that utilizes ChatGPT for hands-on SOC analyst and incident response work, empowering novices to delve into...