Advanced cryptography

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Advanced cryptography.

Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.

Advanced cryptography

After the successful completion of this course you will be able to:

  1. Understand what cryptography really is and how it works.
  2. Understand the working of different tools used such as AES and DES.
  3. Understand the encryption and decryption algorithms
  4. Understand how cryptography and cyber security are connected.

Who this Advanced cryptography course is for:

  1. Anyone who is curious about cryptography and wants to dig a little deeper into the subject.
Show More

What Will You Learn?

  • What is Cryptography and how it works.
  • Different types of cryptography.
  • Cryptographic tools and their uses. (AES and DES)
  • Learn how cryptography helps in keeping our personal data secure.
  • Learn about encrypting and decrypting algorithms.
  • Why cryptography and cyber security are essential.

Course Content

cryptography

  • cryptography – Course Overview
    00:00
  • cryptography – Introduction
    00:00
  • cryptography – Introduction Continued
    00:00
  • cryptography – Hex and ASCII
    00:00
  • cryptography – Breaking the Vigenere Cipher
    00:00
  • cryptography – Principles of Modern Cryptography
    00:00
  • cryptography – Perfect Secrecy
    00:00
  • cryptography – Perfect Secrecy Part II
    00:00
  • cryptography – The One Time Pad
    00:00
  • cryptography – Implementing the One Time Pad
    00:00
  • cryptography – Limitations of the One Time Pad
    00:00
  • cryptography – Computational Secrecy
    00:00
  • cryptography – Computational Secrecy Part II
    00:00
  • cryptography – Pseudorandomness
    00:00
  • cryptography – Pseudorandom Generators
    00:00
  • cryptography – The Pseudo One Time Pad
    00:00
  • cryptography – Proofs of Security
    00:00
  • cryptography – Stronger Security Notions
    00:00
  • cryptography – Pseudorandom Functions and Block Ciphers
    00:00
  • cryptography – CPA Secure Encryption from PRFs Block Ciphers
    00:00
  • cryptography – Modes of Encryption
    00:00
  • cryptography – Security Against Chosen Ciphertext Attacks
    00:00
  • cryptography – Padding Oracle Attacks
    00:00
  • cryptography – Message Integrity
    00:00
  • cryptography – A Fixed Length MAC
    00:00
  • cryptography – CBC MAC
    00:00
  • cryptography – Hash Functions
    00:00
  • cryptography – HMAC
    00:00
  • cryptography – Authenticated Encryption
    00:00
  • cryptography – Secure Communication Sessions
    00:00
  • cryptography – Number Theory One
    00:00
  • cryptography – Number Theory Two
    00:00
  • cryptography – Number Theory Three
    00:00
  • cryptography – Number Theory Four
    00:00
  • cryptography – Number Theory Five
    00:00
  • cryptography – The Public Key Revolution
    00:00
  • cryptography – Diffie Hellman Key Exchange
    00:00
  • cryptography – The Public Key Revolution Part II
    00:00
  • cryptography – Public Key Encryption
    00:00
  • cryptography – Discrete Log Based Public Key Encryption
    00:00
  • cryptography – RSA Based Public Key Encryption
    00:00
  • cryptography – Digital Signatures
    00:00
  • cryptography – Digital Signatures Part II
    00:00
  • cryptography – RSA Based Signatures
    00:00
  • cryptography – Identification Schemes
    00:00
  • cryptography – Public Key Infrastructure PKI
    00:00
  • cryptography – Putting It All Together SSL TLS
    00:00
  • cryptography – Parting Thoughts
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?