Acerca de este Curso
4.3
56 calificaciones
12 revisiones
Programa Especializado
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel intermedio

Nivel intermedio

Horas para completar

Aprox. 7 horas para completar

Sugerido: 2-4 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)
Programa Especializado
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel intermedio

Nivel intermedio

Horas para completar

Aprox. 7 horas para completar

Sugerido: 2-4 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
2 horas para completar

Cryptography Overview

This module defines the technical terms in cryptography and introduce Alice, Bob, and Eve. To study the attacker Eve's perspective, we will describe Kerckhoff's Principle ("the attacker knows the system"), which defines the scope of the attacker knowledge (what is secret vs. what the attacker can know). We will also describe Security by Obscurity, which contrasts Kerckhoff's Principle. ...
Reading
8 videos (Total 19 min), 1 reading, 2 quizzes
Video8 videos
Module Objectives1m
Alice, Bob, and Eve1m
Cryptography Terminology2m
Threat Model and the Attacker Knowledge1m
Kerckhoff's Principle3m
Security by Obscurity and Steganography, Part 12m
Security by Obscurity and Steganography, Part 21m
Reading1 lecturas
Slides for Cryptography Overview20m
Quiz1 ejercicios de práctica
Kerckhoff's Principle and Security by Obscurity30m
Semana
2
Horas para completar
2 horas para completar

Information Entropy

This module studies information entropy to quantify randomness. Information entropy can be used to measure the strength of the key or the secret information that determines the security of a cryptosystem against an attacker who does not know the random key. ...
Reading
6 videos (Total 44 min), 1 reading, 2 quizzes
Video6 videos
Deterministic vs. Random4m
Information Entropy5m
Entropy: Uniform Distribution Case9m
Entropy: General Distribution Case13m
Entropy Recap9m
Reading1 lecturas
Slides for Information Entropy20m
Quiz2 ejercicios de práctica
Throwing a Dice15m
Entropy: Balls in a Bin35m
Semana
3
Horas para completar
1 horas para completar

Brute-Force Attack and Cryptanalysis

This module studies the attacker view whose objective is to learn the key and break the cryptographic protection using the key. First, we will define brute force attack and describe how to quantify the attacker effort for brute force attack. Next, we will contrast cryptanalysis and brute force attack. Lastly, we will discuss about perfect secrecy, which is immune to cryptanalysis and is a strong notion of security derived from information theory. ...
Reading
4 videos (Total 13 min), 1 reading, 1 quiz
Video4 videos
Brute Force Attack3m
Cryptanalysis5m
Perfect Secrecy and One-Time Pad3m
Reading1 lecturas
Lecture Slides for Brute Force and Cryptanalysis20m
Quiz1 ejercicios de práctica
Brute-Force Attack, Cryptanalysis, and One-Time Pad30m
Semana
4
Horas para completar
2 horas para completar

Computational Security and Side-Channel Attack

This module studies cryptography from the practical point of view. We will first define computational security, which relies on the fact that real world attackers are computationally limited unlike information theoretic security, e.g., one-time pad. We will then survey side channel attacks and unintentional information leakage from the physical implementations of cryptosystems. ...
Reading
3 videos (Total 12 min), 2 readings
Video3 videos
Computational Security: Attacker's Computational Bound6m
Side-Channel Attack4m
Reading2 lecturas
Lecture Slides for Computational Security and Side Channel Attacks20m
Reading on physical side-channel attacks10m
4.3
12 revisionesChevron Right
Beneficio de la carrera

83%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones

por RSNov 14th 2018

The course mainly covers criteria for security. I need more of cryptography in it. Its not completely useful.

por SDJan 14th 2018

This is fabulous course that i found, great assignment and questions make this course course worth full.

Instructores

Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

Acerca de University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Acerca del programa especializado Applied Cryptography

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols....
Applied Cryptography

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.