Thank you for signing up for the course! We look forward to working with you and hearing your feedback in our forums.
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Need help getting started?
You can download Supplemental Materials, Lesson Videos and Transcripts from Downloadables (bottom right corner of the Classroom) or from the Dashboard (first option on the navigation bar on the left hand side).
An introduction to the course and symmetric cryptosystems.
How to apply symmetric ciphers to solve problems.
How can encryption keys be shared securely?
In lesson 4 we will learn about the first successful asymmetric cryptosystem, which is called "RSA," which is named for its inventors-- Ron Rivest, Adi Shamir, and Leonard Adleman.
In this lesson we combine the tools from the previous lessons (symmetric encryption, cryptographic hash functions and asymmetric encryption) to create cryptographic protocols, namely those used for authentication.
An exploration of several applications of cryptology
For the final assessment you will demonstrate your knowledge of cryptology and its applications.
Follow this link to access the final project.