Classical Cryptosystems and Core Concepts

  • 4.6
Approx. 12 hours to complete

Course Summary

Learn about classical cryptosystems and their role in modern cryptography. Explore the history of codes and ciphers and understand how they are used in security today.

Key Learning Points

  • Understand the fundamentals of classical cryptosystems
  • Learn about important historical ciphers, such as the Caesar cipher and the Vigenère cipher
  • Gain insight into modern cryptography and its applications

Related Topics for further study


Learning Outcomes

  • Understand the basics of classical cryptosystems and their applications
  • Develop an understanding of the history of ciphers and the evolution of cryptography
  • Gain insight into modern cryptography and its applications in information security

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of mathematics
  • Familiarity with computer science concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Applied Cryptography
  • Cryptography and Information Theory

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Whitfield Diffie

Related Books

Description

Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.

Outline

  • Specialization Introduction
  • About the Instructors
  • Course Introduction
  • About the Instructor
  • About the Course
  • About the Instructor
  • Cryptographic Tidbits
  • What is Cryptography?
  • Codes and Ciphers
  • What is Cryptanalysis?
  • Modern Guiding Principles in Cryptography
  • Lecture Slide - What is Cryptography?
  • Additional Reference Material
  • Lecture Slide - Codes and Ciphers
  • L2: Additional Reference Material
  • Lecture Slide - What is Cryptanalysis
  • L3: Additional Reference Material
  • Lecture Slide - Modern Guiding Principles
  • L4: Additional Reference Material
  • Video - Cryptography for the masses: Nadim Kobeissi
  • Practice Assessment - Cryptographic Tidbits
  • Graded Assessment - Cryptographic Tidbits
  • Cryptanalysis
  • Types of Cryptanalytic Attacks
  • Frequency Analysis of Monoalphabetic Ciphers
  • Multi-Character Frequency Analysis
  • Frequency Analysis of Monoalphabetic Ciphers - Example
  • Key Length Determination in Polyalphabetic Ciphers
  • Example of Cracking a Vigenere Cipher
  • Lecture Slide - Types of Cryptanalytic Attacks
  • Video - Why the NSA is breaking our encryption -- and why we should care | Matthew Green
  • L5: Additional Reference Material
  • Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies
  • L6: Additional Reference Material
  • Lecture Slide - Multi-Character Frequencies Analysis
  • Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example
  • L8: Additional Reference Material
  • Lecture Slide - Key Length Determination in Polyalphabetic Ciphers
  • L9: Additional Reference Material
  • Lecture Slide - Example of Cracking a Vigenere Cipher
  • Practice Assessment - Cryptanalysis
  • Graded Assessment - Cryptanalysis
  • Hash Functions
  • What is a Hash Function?
  • How are Cryptographic Hash Function used
  • How are Cryptographic Hash Functions Attacked? Part I
  • How are Cryptographic Hash Function Attacked? Part II
  • Properties of a Cryptographic Hash Function
  • Lecture Slide - What is a Hash Function?
  • L11: Additional Reference Material
  • Lecture Slide - How are Cryptographic Hash Functions Used?
  • Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I
  • L13: Additional Reference Material
  • Lecture Slide - How are Cryptographic Hash Function Attacked? Part II
  • L14: Additional Reference Material
  • Lecture Slide - What Properties Should a Cryptographic Hash Function Have?
  • Practice Assessment - Hash Functions
  • Graded Assessment - Hash Functions

Summary of User Reviews

Discover the secrets of classical cryptosystems with this comprehensive course on Coursera. Students praise the engaging lectures and practical assignments that help them understand the complex world of encryption.

Key Aspect Users Liked About This Course

engaging lectures and practical assignments

Pros from User Reviews

  • Clear explanations of complex concepts
  • Good balance between theory and practice
  • Interactive quizzes and exercises to reinforce learning
  • Expert instructor with extensive knowledge of the subject

Cons from User Reviews

  • Some lectures may be too technical for beginners
  • Assignments can be time-consuming and challenging
  • Limited interaction with other students
  • No option for personalized feedback on assignments
English
Available now
Approx. 12 hours to complete
William Bahn, Richard White, Sang-Yoon Chang
University of Colorado System
Coursera

Instructor

William Bahn

  • 4.6 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses