Birla Institute of Technology & Science, Pilani

Cryptography

Rajesh Kumar

Instructor: Rajesh Kumar

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

7 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

7 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand various cryptographic and network security services and mechanisms

  • Apply various cryptographic techniques and system-level network security applications

  • Analyse various cryptographic techniques and system-level network security applications

  • Evaluate the cryptographic algorithms, hash algorithms and network application security schemes

Tools you'll learn

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

February 2026

Assessments

103 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 12 modules in this course

In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.

What's included

3 videos1 reading1 discussion prompt

Cryptographic principles are the fundamental concepts and techniques that are used in the field of cryptography to secure communication and protect data. These principles include confidentiality, integrity, authentication, non-repudiation, and key management. Students will grasp how cryptography protects our digital world. We will start with its purpose — turning sensitive data into unreadable formats to keep it safe. Then, we will break down the key principles: confidentiality, integrity, and authentication. We will uncover the essential security services — like access control and non-repudiation. You will learn what they do and why they are crucial for any secure system. We will also explore the mechanisms that make it all work: encryption, hashing, and more.

What's included

10 videos10 readings10 assignments1 discussion prompt

This module introduces students to the foundational techniques of classical cryptography, focusing on how information is transformed to ensure secure communication. Learners will begin by understanding the basic concepts of plain text (readable data) and cipher text (encrypted data), establishing the groundwork for how cryptographic systems operate. The module then explores substitution techniques, where symbols in the plaintext are replaced with other symbols to obscure meaning. Examples such as the Caesar cipher, monoalphabetic cipher, and Vigenère cipher will be studied to illustrate how substitution alters data while maintaining structure. Next, students will examine transposition techniques, which rearrange the positions of characters without changing the symbols themselves. Methods like the Rail Fence cipher and Columnar transposition will demonstrate how order manipulation enhances security.

What's included

13 videos13 readings14 assignments1 discussion prompt

This module introduces symmetric key cryptography and its role in securing data. Learners will explore commonly used symmetric encryption algorithms such as AES, DES, 3DES, and Blowfish, and examine block cipher modes of operation including ECB, CBC, CFB, OFB, and CTR. The module also focuses on the practical application of encryption and decryption using different modes, along with an analysis of security vulnerabilities, key management challenges, and real-world use cases of symmetric cryptographic systems.

What's included

5 videos5 readings5 assignments1 discussion prompt

This module introduces symmetric key cryptography and the concept of shared secret keys. Learners will study classical encryption algorithms such as DES, Double DES, and Triple DES, and explore symmetric key encryption algorithms including IDEA, RC5, and modern standards such as AES and Blowfish. The module also compares block ciphers and stream ciphers through practical examples, and analyses the strengths, limitations, and real-world applications of symmetric encryption algorithms in secure systems.

What's included

6 videos6 readings7 assignments1 discussion prompt

Asymmetric Key Cryptography, also known as Public Key Cryptography, is a cryptographic system that uses a pair of mathematically related keys — a public key for encryption and a private key for decryption. This module explores the underlying mathematical concepts, key generation, encryption and decryption processes, digital signatures, and the role of asymmetric cryptography in securing modern communication systems such as SSL/TLS and email encryption.

What's included

10 videos4 readings11 assignments1 discussion prompt

The Asymmetric Key Cryptography Algorithms module focuses on the study and implementation of major public key algorithms used to secure data and communications. It covers key algorithms such as RSA, Diffie-Hellman, ElGamal, and Elliptic Curve Cryptography (ECC), exploring their mathematical foundations, key generation processes, encryption and decryption mechanisms, and real-world applications in digital security. The module also examines the strengths, weaknesses, and performance considerations of each algorithm in various cryptographic contexts.

What's included

10 videos3 readings11 assignments1 discussion prompt

The Public Key Infrastructure (PKI) module provides an in-depth understanding of the framework that enables secure electronic communication through the management of public-key encryption and digital certificates. This module explores the core components of PKI, including Certificate Authorities (CAs), Registration Authorities (RAs), digital certificates, certificate revocation, and trust models. It also discusses how PKI supports secure email, web authentication (SSL/TLS), code signing, and identity verification in modern networked environments.

What's included

12 videos4 readings12 assignments1 discussion prompt

This module introduces authentication and its role in securing digital systems. Learners will study password-based authentication methods and their limitations, and explore biometric techniques such as fingerprint, facial recognition, and iris-based authentication. The module also examines two-factor and multi-factor authentication, token-based approaches, single sign-on, certificate-based authentication, and Kerberos. Finally, learners will analyse the strengths, weaknesses, vulnerabilities, and real-world applications of different authentication techniques.

What's included

12 videos12 readings14 assignments1 discussion prompt

This module introduces the fundamentals of Internet security and cryptography. Learners will examine common Internet security protocols, including HTTPS, SSL/TLS, IPsec, SSH, SFTP, Kerberos, and OAuth 2.0/OpenID Connect. The module further explores advanced topics such as email security using PGP and S/MIME, core elements of web security, common web security threats, best practices, and emerging trends. Additionally, learners will study network security mechanisms including firewalls, intrusion detection and prevention systems (IDS/IPS), and virtual private networks (VPNs), and evaluate their role in securing modern Internet-based systems.

What's included

9 videos9 readings9 assignments1 discussion prompt

This module introduces modern cryptography and focuses on advanced cryptographic techniques designed to enable privacy, security, and trust in contemporary digital systems. Learners will explore secure multi-party computation, zero-knowledge proofs, fully homomorphic encryption, and oblivious RAM, along with functional encryption and private information retrieval. The module also examines symmetric searchable encryption and leakage-resilient cryptography, and concludes with applications of modern cryptography in secure voting and secure election systems.

What's included

8 videos8 readings9 assignments1 discussion prompt

End-Term Examination

What's included

1 assignment

Instructor

Rajesh Kumar
Birla Institute of Technology & Science, Pilani
3 Courses 444 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions