A prominent expert in the number theory Godfrey Hardy described it in the beginning of 20th century as one of the most obviously useless branches of Pure Mathematics”. Just 30 years after his death, an algorithm for encryption of secret messages was developed using achievements of number theory. It was called RSA after the names of its authors, and its implementation is probably the most frequently used computer program in the world nowadays. Without it, nobody would be able to make secure payments over the internet, or even log in securely to e-mail and other personal services. In this course we will start with the basics of the number theory and get to cryptographic protocols based on it. By the end, you will be able to apply the basics of the number theory to encrypt and decrypt messages, and to break the code if one applies RSA carelessly. You will even pass a cryptographic quest!

Number Theory and Cryptography

Number Theory and Cryptography
This course is part of Introduction to Discrete Mathematics for Computer Science Specialization



Instructors: Michael Levin
Access provided by Kalinga Institute of Industrial Technology
42,227 already enrolled
609 reviews
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
26 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructors

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
69.29%
- 4 stars
20.36%
- 3 stars
5.41%
- 2 stars
1.64%
- 1 star
3.28%
Showing 3 of 609
Reviewed on Nov 30, 2020
Excellent course to learn number theory principles and relate them to asymmetric cryptosystems. The course is highly rigorous and challenging.
Reviewed on Feb 4, 2021
Thank you! enjoyed learning number theory, understood new concepts of modular programming, how public key -private key works and the basis of rsa algorithm.
Reviewed on Sep 17, 2020
Excellent material and teachers.Specifically, the course contents of week 4 : the RSA quiz and the RSA quest quiz material is outstanding! Kudos!
Explore more from Computer Science

University of Leeds

University of Colorado System

Stanford University

University of Colorado System


