Applied Cryptography

Thank you for signing up for the course! We look forward to working with you and hearing your feedback in our forums.

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.


Need help getting started?


Contents


Course Resources

Additional Reading

  1. PyCrypto
  2. Python for Cryptographers
  3. Python for Java Programmers
  4. Math(s) Concepts for Mere Mortals
  5. Lecture Notes (pdf)

Downloadable Materials

You can download Supplemental Materials, Lesson Videos and Transcripts from Downloadables (bottom right corner of the Classroom) or from the Dashboard (first option on the navigation bar on the left hand side).

Course Syllabus

Lesson 1: Symmetric Encryption

An introduction to the course and symmetric cryptosystems.

Lesson 2: Authentication

How to apply symmetric ciphers to solve problems.

Lesson 3: Key Distribution

How can encryption keys be shared securely?

Lesson 4: Asymmetric Encryption

In lesson 4 we will learn about the first successful asymmetric cryptosystem, which is called "RSA," which is named for its inventors-- Ron Rivest, Adi Shamir, and Leonard Adleman.

Lesson 5: Protocols for Authentication (EKE, SSH, TLS)

In this lesson we combine the tools from the previous lessons (symmetric encryption, cryptographic hash functions and asymmetric encryption) to create cryptographic protocols, namely those used for authentication.

Lesson 6: Applications of Cryptography (Anonymous Communication, Voting, Digital Cash)

An exploration of several applications of cryptology

Lesson 7: Wrap up

Final Assessment

For the final assessment you will demonstrate your knowledge of cryptology and its applications.

Follow this link to access the final project.