We may earn an affiliate commission when you visit our partners.
Mac Bowley, Michael Conterio, Marc Scott, Janina A, and Matt Hogan

Topics Covered

  • A brief look at the history of encryption
  • The encryption and decryption process, and the importance of keys
  • The Caesar and Vigenère Ciphers
  • Symmetric and asymmetric encryption schemes
  • Public key encryption in the real world
  • An introduction to quantum cryptography

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Activities

Coming soon We're preparing activities for Introduction to Encryption and Cryptography. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Introduction to Encryption and Cryptography will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.
This textbook provides a modern and comprehensive treatment of cryptography. It covers topics such as number theory, elliptic curves, public-key cryptography, and cryptanalysis.
This comprehensive handbook offers a thorough reference on all aspects of cryptography. It covers topics such as encryption algorithms, protocols, and cryptanalysis.
This popular science book explores the history of cryptography and its impact on society. It great introduction to the topic for general readers.
Provides a hands-on approach to learning encryption algorithms using the C programming language. It covers topics such as block ciphers, stream ciphers, and hash functions.
Covers cloud security concepts, including encryption technologies and best practices for securing cloud services.
Tells the story of the Enigma machine, one of the most important encryption devices in history. It fascinating read for anyone interested in the history of cryptography.
A comprehensive and foundational reference work in applied cryptography. While published in 1996, it remains a vital resource for researchers and practitioners due to its depth and breadth of coverage on cryptographic techniques and mathematical foundations. It is often used as a graduate-level textbook.
Focuses on the practical aspects of designing and implementing secure cryptographic systems. It's an excellent resource for software engineers and system architects, bridging the gap between theoretical cryptography and real-world deployment. It highlights common pitfalls and provides guidance on building secure systems.
Provides a practical introduction to modern cryptography with a focus on real-world applications and implementation pitfalls. It is suitable for undergraduate students and working professionals, particularly those with a programming background. It covers essential concepts and valuable reference for understanding how cryptographic primitives are used securely.
Provides a comprehensive overview of elliptic curves and their applications in cryptography. It is suitable for advanced students and researchers.
The second volume in Goldreich's foundational series, this book delves into the basic applications of the theoretical concepts introduced in Volume 1. It is essential for a deep theoretical understanding of cryptographic applications and is aimed at advanced graduate students and researchers.
Provides a comprehensive overview of blockchains and cryptoassets, including their underlying cryptography. It is suitable for both beginners and advanced students.
Considered a standard textbook for introductory cryptography courses at the undergraduate and graduate levels. provides a rigorous theoretical foundation with an emphasis on formal definitions and proofs of security. It's essential for students seeking a deep understanding of cryptographic principles.
This comprehensive textbook covers a wide range of encryption topics, from fundamental concepts to advanced algorithms and protocols. It provides a solid foundation for understanding the principles and practices of cryptography.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser