278,854 recent views

39%

started a new career after completing these courses

29%

got a tangible career benefit from this course

14%

got a pay increase or promotion

Shareable Certificate

Earn a Certificate upon completion

100% online

Start instantly and learn at your own schedule.

English

Subtitles: English

Skills you will gain

CryptographyCryptographic AttacksPublic-Key CryptographySymmetric-Key Algorithm

39%

started a new career after completing these courses

29%

got a tangible career benefit from this course

14%

got a pay increase or promotion

Shareable Certificate

Earn a Certificate upon completion

100% online

Start instantly and learn at your own schedule.

English

Subtitles: English

Syllabus - What you will learn from this course

Content Rating96%(15,955 ratings)
Week
1

Week 1

4 hours to complete

Course overview and stream ciphers

4 hours to complete
12 videos (Total 210 min), 2 readings, 2 quizzes
12 videos
What is Cryptography?15m
History of Cryptography18m
Discrete Probability (Crash Course)18m
Discrete Probability (Crash Course, Cont.)13m
Information Theoretic Security and The One Time Pad18m
Stream Ciphers and Pseudo Random Generators19m
Attacks on Stream Ciphers and The One Time Pad23m
Real-World Stream Ciphers19m
PRG Security Definitions24m
Semantic Security15m
Stream Ciphers are Semantically Secure [optional]10m
Lecture slides for all six weeks10m
2 practice exercises
Week 1 - Problem Set20m
Week 1 - Programming Assignment [optional]2m
Week
2

Week 2

3 hours to complete

Block Ciphers

3 hours to complete
11 videos (Total 167 min)
11 videos
The Data Encryption Standard21m
Exhaustive Search Attacks19m
More Attacks on Block Ciphers 16m
The AES Block Cipher13m
Block Ciphers From PRGs11m
Review: PRPs and PRFs11m
Modes of Operation: One Time Key7m
Security for Many-Time Key (CPA security)22m
Modes of Operation: Many Time Key (CBC)16m
Modes of Operation: Many Time Key (CTR) 9m
2 practice exercises
Week 2 - Problem Set18m
Week 2 - Programming Assignment [Optional]8m
Week
3

Week 3

3 hours to complete

Message Integrity

3 hours to complete
11 videos (Total 130 min)
11 videos
MACs Based On PRFs9m
CBC-MAC and NMAC19m
PMAC and the Carter-Wegman MAC15m
Introduction 10m
Generic Birthday Attack14m
Constructing Compression Functions8m
HMAC7m
Timing attacks on MAC verification8m
2 practice exercises
Week 3 - Problem Set20m
Week 3 - Programming Assignment [Optional]2m
Week
4

Week 4

3 hours to complete

Authenticated Encryption

3 hours to complete
12 videos (Total 167 min)
12 videos
Definitions 5m
Chosen Ciphertext Attacks12m
Constructions From Ciphers and MACs20m
Case Study: TLS 1.217m
Attacking Non-Atomic Decryption 9m
Key Derivation13m
Deterministic Encryption14m
Deterministic Encryption: SIV and Wide PRP20m
Tweakable Encryption14m
Format Preserving Encryption12m
2 practice exercises
Week 4 - Problem Set20m
Week 4 - Programming Project [Optional]2m