Acerca de este Curso
4.4
36 calificaciones
3 revisiones

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel intermedio

Aprox. 15 horas para completar

Sugerido: 2-5 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel intermedio

Aprox. 15 horas para completar

Sugerido: 2-5 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

Classical Cipher: Substitution

This module defines substitution cipher technique and describes multiple examples for substitution-based classical algorithms: Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher (which is a type of Polyalphabetic Cipher). We will also discuss the mathematical concepts in Modulo Operations to use them to describe the cipher algorithms. ...
8 videos (Total 40 minutos), 2 readings, 4 quizzes
8 videos
Module Objectives2m
Alphabet3m
Substitution and Caesar Cipher6m
Modulo Operation7m
Monoalphabetic Cipher3m
Natural Language Redundancy4m
Polyalphabetic Cipher and Vigenere Cipher8m
2 lecturas
Lecture Slides for Classical Cipher - Substitution15m
About Pseudocode30m
3 ejercicios de práctica
Caesar Cipher20m
Modulo Operation and Caesar Cipher20m
Vigenere Cipher25m
Semana
2
1 hora para completar

Classical Cipher: Transposition

This module studies transposition cipher which, along with substitution cipher, provides a base technique for symmetric ciphers. We define transposition cipher and product cipher and discuss transposition examples in Rail Fence and Permutation Cipher....
5 videos (Total 17 minutos), 1 reading, 2 quizzes
5 videos
Rail Fence Cipher2m
Permutation Cipher6m
Permutation Cipher Security5m
Product Cipher1m
1 lectura
Lecture Slides for Classical Cipher - Transposition15m
2 ejercicios de práctica
Rail Fence Cipher and Permutation Cipher30m
Product Cipher20m
Semana
3
3 horas para completar

Block Cipher and DES

This module is about modern ciphers based on product ciphers. We will first define block cipher and contrast it with stream cipher. We will then describe the ideal block cipher, which maximizes the number of transformations, and Feistel Cipher, which is a practical structure framework approximating the ideal block cipher. As a widely used cipher example based on the Feistel Cipher structure; we will study Data Encryption Standard (DES). ...
8 videos (Total 29 minutos), 2 readings, 3 quizzes
8 videos
Block Cipher vs. Stream Cipher1m
Ideal Block Cipher7m
Feistel Cipher6m
DES Overview3m
DES Round Function1m
DES Subkey Generation1m
DES Security4m
2 lecturas
About Pseudocode30m
Lecture Slides for Block Cipher and DES15m
2 ejercicios de práctica
Ideal Block Cipher20m
DES20m
Semana
4
2 horas para completar

3-DES and AES

To provide stronger security than DES, modern symmetric ciphers can either use multiple ciphers or use an entirely different algorithm. This module reviews examples of each in Triple-DES and AES. ...
4 videos (Total 19 minutos), 2 readings, 2 quizzes
4 videos
Double-DES and Meet-in-the-Middle Attack6m
Triple DES3m
Advanced Encryption Standard (AES)7m
2 lecturas
Lecture Slides for 3-DES and AES15m
Symmetric Algorithm Survey50m
2 ejercicios de práctica
3-DES and 4-DES30m
AES20m

Instructor

Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

Acerca de Sistema Universitario de Colorado

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Acerca del programa especializado Applied Cryptography

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols....
Applied Cryptography

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.