Skip to content

Applied Cryptography

Free Course

Science of Secrets

Related Nanodegree Program

Introduction to Programming

About this course

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

What you will learn

  1. Perfect Ciphers
    • What makes certain ciphers perfect.
    • How the Lorenz Cipher was broken.
  2. Symmetric Encryption
    • Sending messages when two people share a secret.
  3. Key Exchange
    • Techniques to establish a shared secret.
  4. Asymmetric Encryption
    • Exchanging information using public key cryptosystems.
  5. Public Key Protocols
    • Encrypted key exchange, certificates, secure commerce.
  6. Using Cryptographic Primitives
    • How cryptography can be useful for anonymizing communication, voting, and digital cash.
  7. Secure Computation
    • Computing without exposing data.

Prerequisites and requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

Why take this course?

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

Learn with the best.

  • Dave Evans
    Dave Evans