We may earn an affiliate commission when you visit our partners.
Course image
Richard White, Sang-Yoon Chang, and William Bahn

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Four courses

Classical Cryptosystems and Core Concepts

(0 hours)
Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures.

Mathematical Foundations for Cryptography

(0 hours)
Welcome to Course 2 of Introduction to Applied Cryptography. This course introduces basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. These topics should prove especially useful to you if you are new to cybersecurity.

Symmetric Cryptography

(0 hours)
Welcome to Symmetric Cryptography! Symmetric cryptography relies on a shared secret key to ensure message confidentiality. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES.

Asymmetric Cryptography and Key Management

(0 hours)
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography, the sender and receiver use a pair of public-private keys, providing different security properties. We'll study the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol. Lastly, we'll discuss key distribution and management for both symmetric keys and public keys.

Save this collection

Save Introduction to Applied Cryptography to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser