Cryptography and Information Theory

Course Cover

5

(4)

compare button icon
Offer Percent Icon

1 Coupon Available

Login To View All
Course Report - Cryptography and Information Theory

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

8 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

8 hours

Course Description

Welcome to Cryptography and Information Theory

This course is a combination of cryptography (the techniques to protect information from unauthorised access) and information theory (the study and application of information coding and transmission). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.

This course is part of the Applied Cryptography specialization.

blur
blur

Highlights

blur

Hands on training

Top 30 Percentile

blur

Pedagogy

Top 30 Percentile

blur

Parameters

cv-icon

Pedagogy

Acquire all major Cryptography skills in this course for seamless integration into your daily life. Develop a versatile skill set, allowing you to confidently apply what you've learned in various practical scenarios, enhancing your daily experiences and overall proficiency. An exceptional course in Cryptography, this stands out for its Self Paced learning approach. Learners have the flexibility to progress at their own speed, tailoring the experience to their individual needs.

cv-icon

Hands on training

Inclusion of the capstone project and hands-on training offers a dual focus. This enriches its value, making it an ideal choice for those seeking comprehensive learning and real-world application in Cryptography.

Course Overview

projects-img

Hands-On Training,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Learn how to use Information Entropy

Learn how to Brute Force Attack and Cryptanalysis

Learn how to do Side-Channel Attack and Computational Security

Course Instructors

Author Image

Sang-Yoon Chang

Computer Science

I am an assistant professor at the Computer Science department at University of Colorado Colorado Springs (UCCS). I research in computer security and computer network focusing on wireless network, ed...

Course Reviews

Average Rating Based on 4 reviews

5.0

100%

Course Cover
Offer Percent Icon

1 Coupon Available
Get upto 100% - 0% Discount