
About Course
Advanced cryptography.
Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.
After the successful completion of this course you will be able to:
- Understand what cryptography really is and how it works.
- Understand the working of different tools used such as AES and DES.
- Understand the encryption and decryption algorithms
- Understand how cryptography and cyber security are connected.
Who this Advanced cryptography course is for:
- Anyone who is curious about cryptography and wants to dig a little deeper into the subject.
Course Content
cryptography
-
cryptography – Course Overview
00:00 -
cryptography – Introduction
00:00 -
cryptography – Introduction Continued
00:00 -
cryptography – Hex and ASCII
00:00 -
cryptography – Breaking the Vigenere Cipher
00:00 -
cryptography – Principles of Modern Cryptography
00:00 -
cryptography – Perfect Secrecy
00:00 -
cryptography – Perfect Secrecy Part II
00:00 -
cryptography – The One Time Pad
00:00 -
cryptography – Implementing the One Time Pad
00:00 -
cryptography – Limitations of the One Time Pad
00:00 -
cryptography – Computational Secrecy
00:00 -
cryptography – Computational Secrecy Part II
00:00 -
cryptography – Pseudorandomness
00:00 -
cryptography – Pseudorandom Generators
00:00 -
cryptography – The Pseudo One Time Pad
00:00 -
cryptography – Proofs of Security
00:00 -
cryptography – Stronger Security Notions
00:00 -
cryptography – Pseudorandom Functions and Block Ciphers
00:00 -
cryptography – CPA Secure Encryption from PRFs Block Ciphers
00:00 -
cryptography – Modes of Encryption
00:00 -
cryptography – Security Against Chosen Ciphertext Attacks
00:00 -
cryptography – Padding Oracle Attacks
00:00 -
cryptography – Message Integrity
00:00 -
cryptography – A Fixed Length MAC
00:00 -
cryptography – CBC MAC
00:00 -
cryptography – Hash Functions
00:00 -
cryptography – HMAC
00:00 -
cryptography – Authenticated Encryption
00:00 -
cryptography – Secure Communication Sessions
00:00 -
cryptography – Number Theory One
00:00 -
cryptography – Number Theory Two
00:00 -
cryptography – Number Theory Three
00:00 -
cryptography – Number Theory Four
00:00 -
cryptography – Number Theory Five
00:00 -
cryptography – The Public Key Revolution
00:00 -
cryptography – Diffie Hellman Key Exchange
00:00 -
cryptography – The Public Key Revolution Part II
00:00 -
cryptography – Public Key Encryption
00:00 -
cryptography – Discrete Log Based Public Key Encryption
00:00 -
cryptography – RSA Based Public Key Encryption
00:00 -
cryptography – Digital Signatures
00:00 -
cryptography – Digital Signatures Part II
00:00 -
cryptography – RSA Based Signatures
00:00 -
cryptography – Identification Schemes
00:00 -
cryptography – Public Key Infrastructure PKI
00:00 -
cryptography – Putting It All Together SSL TLS
00:00 -
cryptography – Parting Thoughts
00:00
Student Ratings & Reviews
No Review Yet