About this Course

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Play Trailer Play Trailer
Course Cost
Free
Timeline
Approx. 2 months
Skill Level
Advanced
Included in Course
  • Rich Learning Content

  • Interactive Quizzes

  • Taught by Industry Pros

  • Self-Paced Learning

  • Student Support Community

Join the Path to Greatness

This free course is your first step towards a new career with the Android Developer Nanodegree Program.

Free Course

Applied Cryptography

Enhance your skill set and boost your hirability through innovative, independent learning.

Icon steps 54aa753742d05d598baf005f2bb1b5bb6339a7d544b84089a1eee6acd5a8543d

Course Leads

  • Dave Evans
    Dave Evans

    Instructor

What You Will Learn

Lesson 1

Perfect Ciphers

  • What makes certain ciphers perfect.
  • How the Lorenz Cipher was broken.
Lesson 1

Perfect Ciphers

  • What makes certain ciphers perfect.
  • How the Lorenz Cipher was broken.
Lesson 2

Symmetric Encryption

  • Sending messages when two people share a secret.
Lesson 2

Symmetric Encryption

  • Sending messages when two people share a secret.
Lesson 3

Key Exchange

  • Techniques to establish a shared secret.
Lesson 3

Key Exchange

  • Techniques to establish a shared secret.
Lesson 4

Asymmetric Encryption

  • Exchanging information using public key cryptosystems.
Lesson 4

Asymmetric Encryption

  • Exchanging information using public key cryptosystems.
Lesson 5

Public Key Protocols

  • Encrypted key exchange, certificates, secure commerce.
Lesson 5

Public Key Protocols

  • Encrypted key exchange, certificates, secure commerce.
Lesson 6

Using Cryptographic Primitives

  • How cryptography can be useful for anonymizing communication, voting, and digital cash.
Lesson 6

Using Cryptographic Primitives

  • How cryptography can be useful for anonymizing communication, voting, and digital cash.
Lesson 7

Secure Computation

  • Computing without exposing data.
Lesson 7

Secure Computation

  • Computing without exposing data.

Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

Why Take This Course

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

What do I get?
  • Instructor videos
  • Learn by doing exercises
  • Taught by industry professionals
Icon globe e82eae5d45465aba4fbe4bb746905ce55dc3324f310b79c60e4a20089057d347

Udacity 现已提供中文版本! A Udacity tem uma página em português para você! There's a local version of Udacity for you! Sprechen Sie Deutsch?

Besuchen Sie de.udacity.com und entdecken Sie lokale Angebote, unsere Partnerunternehmen und Udacitys deutschsprachigen Blog.

前往优达学城中文网站 Ir para a página brasileira Go to Indian Site Icon flag de deedb1a7a695700236cb6ef4204ddbede5d197dab9b47716c87a0b4d5d9fc325 Zu de.udacity.com continue in English