About this Course
4.4
30 ratings
3 reviews
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Intermediate Level

Intermediate Level

Hours to complete

Approx. 15 hours to complete

Suggested: 2-5 hours/week...
Available languages

English

Subtitles: English...
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Intermediate Level

Intermediate Level

Hours to complete

Approx. 15 hours to complete

Suggested: 2-5 hours/week...
Available languages

English

Subtitles: English...

Syllabus - What you will learn from this course

Week
1
Hours to complete
3 hours to complete

Classical Cipher: Substitution

This module defines substitution cipher technique and describes multiple examples for substitution-based classical algorithms: Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher (which is a type of Polyalphabetic Cipher). We will also discuss the mathematical concepts in Modulo Operations to use them to describe the cipher algorithms. ...
Reading
8 videos (Total 40 min), 2 readings, 4 quizzes
Video8 videos
Module Objectives2m
Alphabet3m
Substitution and Caesar Cipher6m
Modulo Operation7m
Monoalphabetic Cipher3m
Natural Language Redundancy4m
Polyalphabetic Cipher and Vigenere Cipher8m
Reading2 readings
Lecture Slides for Classical Cipher - Substitution15m
About Pseudocode30m
Quiz3 practice exercises
Caesar Cipher20m
Modulo Operation and Caesar Cipher20m
Vigenere Cipher25m
Week
2
Hours to complete
1 hour to complete

Classical Cipher: Transposition

This module studies transposition cipher which, along with substitution cipher, provides a base technique for symmetric ciphers. We define transposition cipher and product cipher and discuss transposition examples in Rail Fence and Permutation Cipher....
Reading
5 videos (Total 17 min), 1 reading, 2 quizzes
Video5 videos
Rail Fence Cipher2m
Permutation Cipher6m
Permutation Cipher Security5m
Product Cipher1m
Reading1 reading
Lecture Slides for Classical Cipher - Transposition15m
Quiz2 practice exercises
Rail Fence Cipher and Permutation Cipher30m
Product Cipher20m
Week
3
Hours to complete
3 hours to complete

Block Cipher and DES

This module is about modern ciphers based on product ciphers. We will first define block cipher and contrast it with stream cipher. We will then describe the ideal block cipher, which maximizes the number of transformations, and Feistel Cipher, which is a practical structure framework approximating the ideal block cipher. As a widely used cipher example based on the Feistel Cipher structure; we will study Data Encryption Standard (DES). ...
Reading
8 videos (Total 29 min), 2 readings, 3 quizzes
Video8 videos
Block Cipher vs. Stream Cipher1m
Ideal Block Cipher7m
Feistel Cipher6m
DES Overview3m
DES Round Function1m
DES Subkey Generation1m
DES Security4m
Reading2 readings
About Pseudocode30m
Lecture Slides for Block Cipher and DES15m
Quiz2 practice exercises
Ideal Block Cipher20m
DES20m
Week
4
Hours to complete
2 hours to complete

3-DES and AES

To provide stronger security than DES, modern symmetric ciphers can either use multiple ciphers or use an entirely different algorithm. This module reviews examples of each in Triple-DES and AES. ...
Reading
4 videos (Total 19 min), 2 readings, 2 quizzes
Video4 videos
Double-DES and Meet-in-the-Middle Attack6m
Triple DES3m
Advanced Encryption Standard (AES)7m
Reading2 readings
Lecture Slides for 3-DES and AES15m
Symmetric Algorithm Survey50m
Quiz2 practice exercises
3-DES and 4-DES30m
AES20m

Instructor

Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Applied Cryptography Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols....
Applied Cryptography

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.