About this Course

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Play Trailer Play Trailer
Applied Cryptography
Course Cost
Free
Timeline
Approx. 2 months
Skill Level
Advanced
Included in Course
  • Icon course 01 3edf6b45629a2e8f1b490e1fb1516899e98b3b30db721466e83b1a1c16e237b1 Rich Learning Content

  • Icon course 04 2edd94a12ef9e5f0ebe04f6c9f6ae2c89e5efba5fd0b703c60f65837f8b54430 Interactive Quizzes

  • Icon course 02 2d90171a3a467a7d4613c7c615f15093d7402c66f2cf9a5ab4bcf11a4958aa33 Taught by Industry Pros

  • Icon course 05 237542f88ede3178ac4845d4bebf431ddd36d9c3c35aedfbd92e148c1c7361c6 Self-Paced Learning

  • Icon course 03 142f0532acf4fa030d680f5cb3babed8007e9ac853d0a3bf731fa30a7869db3a Student Support Community

Join the Path to Greatness

This free course is your first step towards a new career with the Machine Learning Engineer Nanodegree Program.

Free Course

Applied Cryptography

Enhance your skill set and boost your hirability through innovative, independent learning.

Icon steps 54aa753742d05d598baf005f2bb1b5bb6339a7d544b84089a1eee6acd5a8543d

Course Leads

  • Dave Evans
    Dave Evans

    Instructor

What You Will Learn

Lesson 1

Perfect Ciphers

  • What makes certain ciphers perfect.
  • How the Lorenz Cipher was broken.
Lesson 1

Perfect Ciphers

  • What makes certain ciphers perfect.
  • How the Lorenz Cipher was broken.
Lesson 2

Symmetric Encryption

  • Sending messages when two people share a secret.
Lesson 2

Symmetric Encryption

  • Sending messages when two people share a secret.
Lesson 3

Key Exchange

  • Techniques to establish a shared secret.
Lesson 3

Key Exchange

  • Techniques to establish a shared secret.
Lesson 4

Asymmetric Encryption

  • Exchanging information using public key cryptosystems.
Lesson 4

Asymmetric Encryption

  • Exchanging information using public key cryptosystems.
Lesson 5

Public Key Protocols

  • Encrypted key exchange, certificates, secure commerce.
Lesson 5

Public Key Protocols

  • Encrypted key exchange, certificates, secure commerce.
Lesson 6

Using Cryptographic Primitives

  • How cryptography can be useful for anonymizing communication, voting, and digital cash.
Lesson 6

Using Cryptographic Primitives

  • How cryptography can be useful for anonymizing communication, voting, and digital cash.
Lesson 7

Secure Computation

  • Computing without exposing data.
Lesson 7

Secure Computation

  • Computing without exposing data.

Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

Why Take This Course

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

What do I get?
  • Instructor videos
  • Learn by doing exercises
  • Taught by industry professionals
Icon globe e82eae5d45465aba4fbe4bb746905ce55dc3324f310b79c60e4a20089057d347

Udacity 现已提供中文版本! A Udacity tem uma página em português para você! There's a local version of Udacity for you!

前往优达学城中文网站 Ir para a página brasileira Go to Indian Site or continue to Global Site