Basic Cryptography and Programming with Crypto API

  • 4.3
Approx. 16 hours to complete

Course Summary

Learn the basics of cryptography and how it is used in securing data. This course will also introduce you to Crypto API and how it can be used to implement cryptographic algorithms.

Key Learning Points

  • Understanding the fundamentals of cryptography
  • Learning about different encryption techniques
  • Implementing cryptographic algorithms using Crypto API

Job Positions & Salaries of people who have taken this course might have

  • Cryptographer
    • USA: $100,000 - $150,000
    • India: INR 8,00,000 - INR 12,00,000
    • Spain: €35,000 - €50,000
  • Cybersecurity Analyst
    • USA: $70,000 - $120,000
    • India: INR 4,00,000 - INR 10,00,000
    • Spain: €25,000 - €45,000
  • Software Engineer
    • USA: $80,000 - $120,000
    • India: INR 3,50,000 - INR 10,00,000
    • Spain: €30,000 - €45,000

Related Topics for further study


Learning Outcomes

  • Develop an understanding of the fundamentals of cryptography
  • Implement cryptographic algorithms using Crypto API
  • Learn about different encryption techniques and their applications

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of programming concepts
  • Familiarity with computer networks

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures
  • Quizzes and assignments

Similar Courses

  • Applied Cryptography
  • Cryptography and Network Security

Related Education Paths


Related Books

Description

In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks, and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel. We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm, and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge, we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account.

Outline

  • Basic Cryptography
  • Course Overview
  • Basic Cryptography
  • Kerckhoff's Principle
  • CryptoAnalysis of Monoalphabetic Substitution Cipher
  • Columnar Transposition Ciphers
  • One-Time Pad & Quantum Key Distribution
  • Introduction to cryptology, Part1, from IBM developerWorks
  • What makes a cryptographic protocol strong?
  • Basic Cryptoanalysis. Three Basic Variations of Cryptoanalysis or Cipher Attack:
  • Columnar transposition Ciphers
  • One time pad encryption
  • Exam 2.1
  • Symmetric Key Cryptography
  • Symmetric Key Algorithm
  • Advanced Encryption Standard
  • AES Expansion/Schedule
  • AES Selection Criteria
  • Dealing with Block Swapping and Replay Attacks
  • Block Cipher Mode of Operation
  • Symmetric Key Encryption and DES
  • AES: The Advanced Encryption Standard by Avi Kak
  • Section 8.8 Key Expansion Algorithm from Prof. Section 8.8 Key Expansion Algorithm Lecture Note
  • Report on the Development of the Advanced Encryption Standard (AES)
  • Block cipher mode of operation
  • Exam 2.2. Symmetric Key Algorithm
  • Asymmetric Key Cryptography
  • Diffie-Hellman Symmetric Key Exchange Protocol
  • Modular Arithmetic
  • Euler Totient Theorem
  • RSA Asymmetric Crypto Algorithm
  • Understanding RSA with OpenSSL
  • Diffie-Hellman Key Exchange Protocol
  • Modular Arithemetic
  • Euler's Totient Theorem
  • RSA Cryptosystem
  • OpenSSL Command-Line HOWTO
  • Exam 2.3. Asymmetric Key Cryptography
  • Develop Secure Programs with Crypto API
  • Use Crypto API to Encrypt and Decrypt
  • Use Crypto API to Sign and Verify
  • Mini Capstone: Enhance Registration Web Site Security
  • PHP encrypt and decrypt crypto api
  • PHP Openssl sign and verify API
  • Ashley Madison Case
  • Exam 2.4. Develop Secure Programs with Crypto API

Summary of User Reviews

Discover the fundamentals of cryptography and crypto API with this course on Coursera. Students have rated this course positively and find it helpful for learning about encryption techniques. However, some have mentioned that the course can be challenging for beginners.

Key Aspect Users Liked About This Course

Many users found the course to be helpful for learning about encryption techniques.

Pros from User Reviews

  • Course covers the fundamentals of cryptography
  • Provides a comprehensive understanding of crypto API
  • Instructors are knowledgeable and engaging
  • Assignments are challenging but rewarding
  • Course materials are well-organized and easy to follow

Cons from User Reviews

  • Can be challenging for beginners
  • Some topics are not explained in enough detail
  • No hands-on practice with crypto API
  • Not enough real-world examples
  • Some students found the course to be too theoretical
English
Available now
Approx. 16 hours to complete
Edward Chow
University of Colorado System
Coursera

Instructor

Edward Chow

  • 4.3 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses