**Acerca de este curso: **Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects. In a second course (Crypto II) we will cover more advanced cryptographic tasks such as zero-knowledge, privacy mechanisms, and other forms of encryption.

ES

The course is excellent! Exactly what you would expect from a world-class institution like Stanford.

Prof. Boneh masterfully guides you through the core building blocks of cryptography, beautifully weaving the concepts into a logical framework that helps understanding the big picture and the role that each plays. The course is very rigorous but the math is not overwhelming and also discusses very useful practical topics like common cryptographic protocols (TLS, WEP, etc.) and the attacks that were discovered over the years.

The course is challenging and takes quite a bit of effort, but at the end I feel that I learned a lot. While I probably need some more time and practice exercises to fully absorb the material, I feel that from here I could go on and independently dig deeper in some of the topics or tackle more advanced one.

Looking forward to part II!