About this Course

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Play Trailer Play Trailer
Course Cost
Free
Timeline
Approx. 2 months
Skill Level
Advanced
Included in Course
  • Rich Learning Content

  • Interactive Quizzes

  • Taught by Industry Pros

  • Self-Paced Learning

  • Student Support Community

Join the Path to Greatness

This free course is your first step towards a new career with the Android Developer Nanodegree Program.

Free Course

Applied Cryptography

Enhance your skill set and boost your hirability through innovative, independent learning.

Icon steps

Course Leads

  • Dave Evans
    Dave Evans

    Instructor

What You Will Learn

Lesson 1

Perfect Ciphers

  • What makes certain ciphers perfect.
  • How the Lorenz Cipher was broken.
Lesson 1

Perfect Ciphers

  • What makes certain ciphers perfect.
  • How the Lorenz Cipher was broken.
Lesson 2

Symmetric Encryption

  • Sending messages when two people share a secret.
Lesson 2

Symmetric Encryption

  • Sending messages when two people share a secret.
Lesson 3

Key Exchange

  • Techniques to establish a shared secret.
Lesson 3

Key Exchange

  • Techniques to establish a shared secret.
Lesson 4

Asymmetric Encryption

  • Exchanging information using public key cryptosystems.
Lesson 4

Asymmetric Encryption

  • Exchanging information using public key cryptosystems.
Lesson 5

Public Key Protocols

  • Encrypted key exchange, certificates, secure commerce.
Lesson 5

Public Key Protocols

  • Encrypted key exchange, certificates, secure commerce.
Lesson 6

Using Cryptographic Primitives

  • How cryptography can be useful for anonymizing communication, voting, and digital cash.
Lesson 6

Using Cryptographic Primitives

  • How cryptography can be useful for anonymizing communication, voting, and digital cash.
Lesson 7

Secure Computation

  • Computing without exposing data.
Lesson 7

Secure Computation

  • Computing without exposing data.

Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

Why Take This Course

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

What do I get?
  • Instructor videos
  • Learn by doing exercises
  • Taught by industry professionals
Icon globe

Udacity 现已提供中文版本! A Udacity tem uma página em português para você! There's a local version of Udacity for you! Sprechen Sie Deutsch?

Besuchen Sie de.udacity.com und entdecken Sie lokale Angebote, unsere Partnerunternehmen und Udacitys deutschsprachigen Blog.

前往优达学城中文网站 Ir para a página brasileira Go to Indian Site Icon flag de Zu de.udacity.com continue in English