Basic Cryptography and Programming with Crypto API

2.9
Rated 2.9 out of 5

In this MOOC we will learn the basic concepts and principles of crytography apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems.

We will also learn the efficient symmetric key cryptography algorithms for encrypting data discuss the DES and AES standards study the criteria for selecting AES standard present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel.

We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account.

WEEK 1
4 hours to complete
Basic Cryptography
In this module we learn the basic concepts and principles of crytography introduce the basic concept of cryptoanalysis using mono-alphabetic substitution cipher as an example and discuss the one-time-pad and quantum key distribution concepts.
6 videos (Total 50 min) 5 readings 1 quiz

WEEK 2
6 hours to complete
Symmetric Key Cryptography
In this module we present the basic mechanism of symmetric key crytography algorithms discuss the DES and AES standard describe the criteria for selecting AES standard present the block cipher operating modes and discuss how the block swapping attacks and replay attacks can be prevented and detected.
6 videos (Total 55 min) 5 readings 2 quizzes

WEEK 3
5 hours to complete
Asymmetric Key Cryptography
In this module we will learn the modular arithmetic the Euler Totient Theorm the RSA Asymmetric Crypto Algorithm use OpenSSL to realize the basic operations of RSA Crypto Algorithm and Diffie-Hellman Symmetric Key Exchange Protocol to derive session keys.
5 videos (Total 58 min) 5 readings 2 quizzes

WEEK 4
2 hours to complete
Develop Secure Programs with Crypto API
In this module we learn how to use Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply the techniques to enhance the registration process of a web site which ensures the account created is actually belonging to the owner of the email account the request profile.
3 videos (Total 45 min) 3 readings 1 quiz


Tham gia đánh giá khóa học

Nếu bạn đã học qua khóa học này thì mời bạn tham gia đóng góp ý kiến và đánh giá để cộng đồng bạn học có thêm thông tin tham khảo.

Cung cấp bởi: Coursera /  University of Colorado System

Thời lượng: 17 hours
Ngôn ngữ giảng dạy: Tiếng Anh
Chi phí: Miễn phí / 0
Đối tượng: Intermediate

Thông tin về nhà cung cấp

Coursera (/ kərˈsɛrə /) là một nền tảng học tập trực tuyến toàn cầu được thành lập vào năm 2012 bởi 2 giáo sư khoa học máy tính của đại học Stanford là Andrew NgDaphne Koller, nền tảng này cung cấp các khóa học trực tuyến (MOOC) cho cộng đồng người học online.

Coursera hợp tác với các trường đại học danh tiếng tại Bắc Mỹ và trên khắp thế giới, cùng với nhiều tổ chức khác để cung cấp các khóa học trực tuyến chất lượng, theo chuyên ngành và được cấp chứng chỉ trong nhiều lĩnh vực như kỹ thuật, khoa học dữ liệu, học máy, toán học, kinh doanh, khoa học máy tính, tiếp thị kỹ thuật số, nhân văn, y học, sinh học, khoa học xã hội , và nhiều ngành khác.

Các khóa học cùng chủ đề

Secure Networked System with Firewall and IDS

In this MOOC we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security constructing a dual-firewall...

Azure Infrastructure Fundamentals

Microsoft Azure is a service created by Microsoft to provide cloud computing for creating and managing applications and services using a cloud environment. Azure provides software as a service (SaaS)...

Identifying Security Vulnerabilities in C/C++Programming

This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities courses one and two in this specialization. This course uses...

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top