About this Course

184,934 recent views

Learner Career Outcomes

39%

started a new career after completing these courses

29%

got a tangible career benefit from this course

14%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Approx. 23 hours to complete
English

Skills you will gain

CryptographyCryptographic AttacksPublic-Key CryptographySymmetric-Key Algorithm

Learner Career Outcomes

39%

started a new career after completing these courses

29%

got a tangible career benefit from this course

14%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Approx. 23 hours to complete
English

Instructor

Offered by

Placeholder

Stanford University

Syllabus - What you will learn from this course

Content RatingThumbs Up96%(17,459 ratings)Info
Week
1

Week 1

5 hours to complete

Course overview and stream ciphers

5 hours to complete
12 videos (Total 210 min), 2 readings, 2 quizzes
12 videos
What is Cryptography?15m
History of Cryptography18m
Discrete Probability (Crash Course)18m
Discrete Probability (Crash Course, Cont.)13m
Information Theoretic Security and The One Time Pad18m
Stream Ciphers and Pseudo Random Generators19m
Attacks on Stream Ciphers and The One Time Pad23m
Real-World Stream Ciphers19m
PRG Security Definitions24m
Semantic Security15m
Stream Ciphers are Semantically Secure [optional]10m
2 readings
Lecture slides for all six weeks10m
Course overview and additional reading resources10m
2 practice exercises
Week 1 - Problem Set30m
Week 1 - Programming Assignment [optional]30m
Week
2

Week 2

4 hours to complete

Block Ciphers

4 hours to complete
11 videos (Total 167 min)
11 videos
The Data Encryption Standard21m
Exhaustive Search Attacks19m
More Attacks on Block Ciphers 16m
The AES Block Cipher13m
Block Ciphers From PRGs11m
Review: PRPs and PRFs11m
Modes of Operation: One Time Key7m
Security for Many-Time Key (CPA security)22m
Modes of Operation: Many Time Key (CBC)16m
Modes of Operation: Many Time Key (CTR) 9m
2 practice exercises
Week 2 - Problem Set30m
Week 2 - Programming Assignment [Optional]30m
Week
3

Week 3

3 hours to complete

Message Integrity

3 hours to complete
11 videos (Total 130 min)
11 videos
MACs Based On PRFs9m
CBC-MAC and NMAC19m
MAC Padding8m
PMAC and the Carter-Wegman MAC15m
Introduction 10m
Generic Birthday Attack14m
The Merkle-Damgard Paradigm 11m
Constructing Compression Functions8m
HMAC7m
Timing attacks on MAC verification8m
2 practice exercises
Week 3 - Problem Set30m
Week 3 - Programming Assignment [Optional]30m
Week
4

Week 4

4 hours to complete

Authenticated Encryption

4 hours to complete
12 videos (Total 167 min)
12 videos
Definitions 5m
Chosen Ciphertext Attacks12m
Constructions From Ciphers and MACs20m
Case Study: TLS 1.217m
CBC Padding Attacks14m
Attacking Non-Atomic Decryption 9m
Key Derivation13m
Deterministic Encryption14m
Deterministic Encryption: SIV and Wide PRP20m
Tweakable Encryption14m
Format Preserving Encryption12m
2 practice exercises
Week 4 - Problem Set30m
Week 4 - Programming Project [Optional]30m

Reviews

TOP REVIEWS FROM CRYPTOGRAPHY I

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.