Acerca de este Curso
3,536 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

Integer Foundations

5 videos (Total 60 minutos), 10 readings, 2 quizzes
5 videos
Multiplicative Inverses12m
Extended Euclidean Algorithm13m
10 lecturas
Course Introduction10m
Lecture Slides - Divisibility, Primes, GCD10m
Video - Adam Spencer: Why I fell in love with monster prime numbers15m
L16: Additional Reference Material10m
Lecture Slides - Modular Arithmetic10m
L17: Additional Reference Material10m
Lecture Slides - Multiplicative Inverses10m
L18: Additional Reference Material10m
Lecture Slides - Extended Euclidean Algorithm10m
L19: Additional Reference Material10m
2 ejercicios de práctica
Practice Assessment - Integer Foundation18m
Graded Assessment - Integer Foundation16m
Semana
2
3 horas para completar

Modular Exponentiation

4 videos (Total 51 minutos), 9 readings, 2 quizzes
9 lecturas
Lecture Slides - Square-and-Multiply10m
Video - Modular exponentiation made easy10m
L20: Additional Reference Material10m
Lecture Slide - Euler's Totient Theorem10m
L21: Additional Reference Material10m
Lecture Slide - Eulers Totient Function10m
L22: Additional Reference Material10m
Lecture Slide - Discrete Logarithms10m
L23: Additional Reference Material10m
2 ejercicios de práctica
Practice Assessment - Modular Exponentiation12m
Graded Assessment - Modular Exponentiation20m
Semana
3
3 horas para completar

Chinese Remainder Theorem

3 videos (Total 25 minutos), 5 readings, 2 quizzes
5 lecturas
Lecture Slide - CRT Concepts, Integer-to-CRT Conversions30m
L24: Additional Reference Material10m
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30m
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30m
Video - How they found the World's Biggest Prime Number - Numberphile12m
2 ejercicios de práctica
Practice Assessment - Chinese Remainder Theorem12m
Graded Assessment - Chinese Remainder Theorem20m
Semana
4
3 horas para completar

Primality Testing

3 videos (Total 36 minutos), 8 readings, 3 quizzes
8 lecturas
Lecture Slide - Trial Division10m
L27: Additional Reference Material10m
Lecture Slide - Fermat's Primality10m
L28: Additional Reference Material10m
Lecture Slide - Miller-Rabin10m
Video - James Lyne: Cryptography and the power of randomness10m
L29: Additional Reference Material10m
The Science of Encryption10m
3 ejercicios de práctica
Practice Assessment - Primality Testing12m
Graded Assessment - Primality Testing20m
Course Project8m

Instructores

Avatar

William Bahn

Lecturer
Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science
Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

Acerca de Sistema Universitario de Colorado

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Acerca de Programa especializado Introduction to Applied Cryptography

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience....
Introduction to Applied Cryptography

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.