Symmetric Cryptography

  • 4.6
Approx. 13 hours to complete

Course Summary

This course provides an in-depth understanding of symmetric cryptography and its applications. From fundamental concepts to practical implementations, students will explore the intricacies of symmetric cryptography.

Key Learning Points

  • Learn the basics of symmetric cryptography and its applications
  • Understand the different types of symmetric key algorithms and their strengths and weaknesses
  • Explore practical implementations of symmetric cryptography in various industries

Related Topics for further study


Learning Outcomes

  • Understand the principles of symmetric cryptography
  • Identify the different types of symmetric key algorithms
  • Apply symmetric cryptography in real-world scenarios

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of cryptography
  • Familiarity with basic mathematical concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cryptography I
  • Cryptography and Information Theory

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Whitfield Diffie

Related Books

Description

Welcome to Symmetric Cryptography!

Outline

  • Classical Cipher: Substitution
  • Instructor Introduction
  • Module Objectives
  • Alphabet
  • Substitution and Caesar Cipher
  • Modulo Operation
  • Monoalphabetic Cipher
  • Natural Language Redundancy
  • Polyalphabetic Cipher and Vigenere Cipher
  • Lecture Slides for Classical Cipher - Substitution
  • About Pseudocode
  • Caesar Cipher
  • Modulo Operation and Caesar Cipher
  • Vigenere Cipher
  • Classical Cipher: Transposition
  • Module Objectives
  • Rail Fence Cipher
  • Permutation Cipher
  • Permutation Cipher Security
  • Product Cipher
  • Lecture Slides for Classical Cipher - Transposition
  • Rail Fence Cipher and Permutation Cipher
  • Product Cipher
  • Block Cipher and DES
  • Modern Cipher and Module Objectives
  • Block Cipher vs. Stream Cipher
  • Ideal Block Cipher
  • Feistel Cipher
  • DES Overview
  • DES Round Function
  • DES Subkey Generation
  • DES Security
  • About Pseudocode
  • Lecture Slides for Block Cipher and DES
  • Ideal Block Cipher
  • DES
  • 3-DES and AES
  • Module Ojectives
  • Double-DES and Meet-in-the-Middle Attack
  • Triple DES
  • Advanced Encryption Standard (AES)
  • Lecture Slides for 3-DES and AES
  • Symmetric Algorithm Survey
  • 3-DES and 4-DES
  • AES
  • Block Cipher Operation Modes
  • Module Objectives
  • Electronic Codebook (ECB)
  • Cipher Block Chaining (CBC)
  • Cipher Feedback (CFB)
  • Output Feedback (OFB)
  • Counter (CTR)
  • Lecture Slides for Block Cipher Operation Modes
  • Block Cipher Operation Modes

Summary of User Reviews

Discover the secrets of symmetric cryptography in this in-depth course on Coursera. Users highly recommend this course for its comprehensive coverage of the topic and its practical applications. One key aspect that many users thought was good is the instructor's ability to explain complex concepts in a clear and concise manner.

Pros from User Reviews

  • Comprehensive coverage of the topic
  • Practical applications of symmetric cryptography
  • Clear and concise explanations of complex concepts
  • Engaging and interactive course materials

Cons from User Reviews

  • Some users found the course too technical
  • Lack of practical exercises to reinforce concepts
  • Limited interaction with the instructor and other students
  • Some users felt that the pace of the course was too slow
  • No certification or accreditation offered upon completion
English
Available now
Approx. 13 hours to complete
Sang-Yoon Chang
University of Colorado System
Coursera

Instructor

Sang-Yoon Chang

  • 4.6 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses