Cryptography and Information Theory

  • 4.5
Approx. 8 hours to complete

Course Summary

This course on Cryptography and Information Theory provides a comprehensive understanding of cryptographic systems and their role in information security. Students will learn about the fundamental concepts of cryptography, including symmetric and asymmetric key algorithms, digital signatures, and cryptographic protocols.

Key Learning Points

  • Learn the basics of cryptography and how it is used to secure information
  • Understand the principles of symmetric and asymmetric key algorithms
  • Gain hands-on experience with cryptographic protocols and digital signatures

Related Topics for further study


Learning Outcomes

  • Understand the principles of cryptography and information theory
  • Gain practical experience with cryptographic protocols and digital signatures
  • Develop the skills required to design secure cryptographic systems

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer programming
  • Familiarity with mathematical concepts like modular arithmetic and probability theory

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Applied Cryptography
  • Cryptography II
  • Computer Security and Systems Management

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Whitfield Diffie

Related Books

Description

Welcome to Cryptography and Information Theory!

Outline

  • Cryptography Overview
  • Instructor Introduction
  • Module Objectives
  • Alice, Bob, and Eve
  • Cryptography Terminology
  • Threat Model and the Attacker Knowledge
  • Kerckhoff's Principle
  • Security by Obscurity and Steganography, Part 1
  • Security by Obscurity and Steganography, Part 2
  • Slides for Cryptography Overview
  • Kerckhoff's Principle and Security by Obscurity
  • Information Entropy
  • Module Objectives
  • Deterministic vs. Random
  • Information Entropy
  • Entropy: Uniform Distribution Case
  • Entropy: General Distribution Case
  • Entropy Recap
  • Slides for Information Entropy
  • Throwing a Dice
  • Entropy: Balls in a Bin
  • Brute-Force Attack and Cryptanalysis
  • Module Objectives
  • Brute Force Attack
  • Cryptanalysis
  • Perfect Secrecy and One-Time Pad
  • Lecture Slides for Brute Force and Cryptanalysis
  • Brute-Force Attack, Cryptanalysis, and One-Time Pad
  • Computational Security and Side-Channel Attack
  • Module Objectives
  • Computational Security: Attacker's Computational Bound
  • Side-Channel Attack
  • Lecture Slides for Computational Security and Side Channel Attacks
  • Reading on physical side-channel attacks

Summary of User Reviews

This course on cryptography and information theory has received positive reviews from users. Many have praised the course's comprehensive coverage and practical approach to the subject matter.

Key Aspect Users Liked About This Course

Practical approach to the subject matter.

Pros from User Reviews

  • Comprehensive coverage of cryptography and information theory
  • Practical applications of concepts taught in the course
  • Engaging and knowledgeable instructors
  • Well-structured course materials and assignments

Cons from User Reviews

  • Some users found the course material to be too technical
  • The pace of the course may be too slow for advanced learners
  • Limited opportunities for interaction with instructors and peers
English
Available now
Approx. 8 hours to complete
Sang-Yoon Chang
University of Colorado System
Coursera

Instructor

Sang-Yoon Chang

  • 4.5 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses