5

(4)

compare button icon

Course Features

icon

Duration

23 hours

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

3 hours per week

icon

Teaching Type

Self Paced

icon

Video Content

23 hours

Course Description

The most important tool to protect information within computer systems is cryptography. This course will teach you the intricacies of cryptographic systems, and show you how to use them correctly in real-world situations. This course starts with an in-depth discussion about how two people with the same secret key can securely communicate with each other even if an adversary is watching and trying to disrupt traffic. Examining many protocols will be done. We'll also examine the flaws in current systems. Second half of course will be about public-key methods that allow two people to generate a secret key. Participants will have the opportunity to work with fun programming projects and be exposed to exciting problems. We will be covering advanced cryptographic tasks like zero-knowledge and privacy mechanisms in a second course, Crypto II.

Course Overview

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Cryptography

Cryptographic Attacks

Public-Key Cryptography

Symmetric-Key Algorithm

Course Instructors

Author Image

Dan Boneh

Professor

Professor Dan Boneh heads the applied cryptography group at the Computer Science department at Stanford University. Professor Boneh's research focuses on applications of cryptography to computer secu...

Course Reviews

Average Rating Based on 4 reviews

5.0

100%

Course Cover