We may earn an affiliate commission when you visit our partners.
Course image
Sang-Yoon Chang

Welcome to Cryptography and Information Theory!

Read more

Welcome to Cryptography and Information Theory!

This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.

This course is a part of the Applied Cryptography specialization.

Enroll now

What's inside

Syllabus

Cryptography Overview
This module defines the technical terms in cryptography and introduce Alice, Bob, and Eve. To study the attacker Eve's perspective, we will describe Kerckhoff's Principle ("the attacker knows the system"), which defines the scope of the attacker knowledge (what is secret vs. what the attacker can know). We will also describe Security by Obscurity, which contrasts Kerckhoff's Principle.
Read more
Information Entropy
This module studies information entropy to quantify randomness. Information entropy can be used to measure the strength of the key or the secret information that determines the security of a cryptosystem against an attacker who does not know the random key.
Brute-Force Attack and Cryptanalysis
This module studies the attacker view whose objective is to learn the key and break the cryptographic protection using the key. First, we will define brute force attack and describe how to quantify the attacker effort for brute force attack. Next, we will contrast cryptanalysis and brute force attack. Lastly, we will discuss about perfect secrecy, which is immune to cryptanalysis and is a strong notion of security derived from information theory.
Computational Security and Side-Channel Attack
This module studies cryptography from the practical point of view. We will first define computational security, which relies on the fact that real world attackers are computationally limited unlike information theoretic security, e.g., one-time pad. We will then survey side channel attacks and unintentional information leakage from the physical implementations of cryptosystems.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops foundational understanding in cryptography and information theory, establishing a solid base for beginners
Provides practical insights into real-world cryptography applications, highlighting computational security and side-channel attacks
Examines cryptography from both theoretical and practical perspectives, offering a comprehensive view of the subject
Requires minimum prerequisites, making it accessible to learners with varying backgrounds
Course instructors are recognized experts in cryptography, ensuring high-quality content and instruction
Part of the Applied Cryptography specialization, providing opportunities for further exploration

Save this course

Save Cryptography and Information Theory to your list so you can find it easily later:
Save

Reviews summary

Cryptographic concepts

Learners say this course is largely positive and a good introduction to cryptography and information theory. The content is clear and easy to follow, with plenty of examples. The quizzes and assignments are well-designed to help you understand the concepts. The instructor is knowledgeable and engaging and provides clear explanations. Overall, this course is a valuable resource for anyone interested in learning about cryptography and information theory.
Well-designed quizzes and assignments
"Course is very simple to follow with good questions in the quizes"
"It is a good course to beging with cyrptography. Quizzes and Assignments are also well designed to understand the concepts."
"Course was really nice and informative. It helps a lot in cryptographic domain related work."
Knowledgeable and engaging
"Great Intro to Cryptology core concepts! Professor is also super clear in his explanations."
"A great course for beginners. It is evident, that the Instructor has put much effort in designing this course."
"The instructor is knowledgeable and engaging and provides clear explanations."
Concepts explained clearly
"Wording is simple with plenty of examples and analogies. Easy to follow."
"The course gave me very good basics in Cryptography."
"Professor was clear and concise in his explanations and the work required was reasonable."
In-depth and informative
"The course content was very relevant and applicable."
"It was a great course and the tutor explained it well."
"This course helps in developing research and teaching skills."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cryptography and Information Theory with these activities:
Review definitions and basic concepts of cryptography
Review and refresh your understanding of the building blocks of modern cryptography concepts, ensuring a strong foundation for the course's more challenging material.
Browse courses on Cryptography
Show steps
  • Go through a series of definitions of key terms such as cipher, encryption, decryption, cryptosystem, and other related to cryptography.
  • Review the fundamental principles and concepts underlying modern cryptography.
Participate in a study group to discuss concepts and solve problems
Collaborate with peers to share knowledge, discuss course concepts, and work together on problem-solving, strengthening your understanding through active engagement.
Show steps
  • Join or form a study group with peers who are also enrolled in the course.
  • Meet regularly to discuss course material, clarify concepts, and work through problems together.
Practice simple information theory calculations
Engage with tutorials and exercises to improve your understanding of information theory, a vital foundation for the course's exploration of cryptography.
Browse courses on Information Theory
Show steps
  • Follow guided tutorials to gain a solid understanding of information theory concepts and their mathematical formulations.
  • Complete practice exercises involving calculations of entropy, information gain, conditional entropy, and mutual information.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Solve coding challenges on cryptosystem implementation
Enhance your practical skills by solving coding challenges that involve implementing cryptosystems, reinforcing your understanding of cryptographic algorithms.
Browse courses on Coding Challenges
Show steps
  • Identify and select coding challenges related to cryptosystem implementation.
  • Implement the encryption and decryption algorithms based on the challenge description.
  • Test and validate your implementation against sample inputs and outputs, ensuring correctness.
Read 'Introduction to Modern Cryptography' by Katz and Lindell
Expand your understanding of modern cryptography through this comprehensive textbook, gaining insights into advanced concepts and real-world applications.
Show steps
  • Read and comprehend the chapters on basic concepts, cryptosystems, security protocols, and number theory.
  • Solve practice exercises and review examples to reinforce your understanding.
Design a simple cryptosystem for a specific scenario
Apply your knowledge to create your own cryptosystem, fostering a deeper comprehension of the principles and challenges of designing secure systems.
Show steps
  • Define the specific scenario and security requirements for your cryptosystem design.
  • Research and select appropriate cryptographic algorithms and techniques to meet the requirements.
  • Implement the encryption and decryption algorithms, ensuring their correctness and efficiency.
  • Design and implement a key generation mechanism to securely generate and distribute keys.
  • Perform security analysis to evaluate the strength and weaknesses of your cryptosystem against potential attacks.
Create a comprehensive study guide
Organize and summarize key concepts, definitions, and theorems from the course to enhance your understanding and retention of the material.
Show steps
  • Review and compile notes, assignments, quizzes, and exams to identify key concepts.
  • Summarize and organize the information in a logical structure, using headings, subheadings, and bullet points.

Career center

Learners who complete Cryptography and Information Theory will develop knowledge and skills that may be useful to these careers:
Cryptographer
Cryptographers develop and implement codes and ciphers to protect information from unauthorized access. They may work for governments, corporations, or other organizations that need to keep their data confidential. This course is highly relevant to anyone who wants to work as a Cryptographer.
Information Security Analyst
Information Security Analysts implement and manage the security measures that protect an organization's computer networks and systems. They may also conduct security audits and risk assessments to identify vulnerabilities and develop plans to mitigate them. A solid understanding of information theory and cryptography is key for anyone entering this field.
Security Architect
Security Architects design and implement security solutions for organizations. They may work on a variety of projects, from designing security policies to implementing security technologies. A deep understanding of cryptography is essential for individuals in this field.
Penetration Tester
Penetration Testers identify vulnerabilities in computer networks and systems by simulating attacks. They may work for governments, corporations, or other organizations that need to improve their security posture. A solid understanding of cryptography is essential for anyone who wants to work as a Penetration Tester.
Security Consultant
Security Consultants help organizations assess and improve their security posture. They may conduct security audits, risk assessments, and penetration tests to identify vulnerabilities and develop plans to mitigate them. Individuals in this role need an in-depth knowledge of cryptography and information security principles.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from unauthorized access, use, and disclosure. They may also conduct security audits and risk assessments to identify vulnerabilities and develop plans to mitigate them. A strong understanding of cryptography is essential for individuals in this field.
Network Security Engineer
Network Security Engineers design, implement, and manage security measures to protect computer networks from unauthorized access. They may also conduct security audits and risk assessments to identify vulnerabilities and develop plans to mitigate them. Understanding cryptography is key to becoming a Network Security Engineer.
Data Scientist
Data Scientists combine the skills of analysts, mathematicians, statisticians, and programmers to draw meaningful insights from data. They often use machine learning and other advanced algorithms to process and analyze large, complex datasets. A background in information theory and the mathematics of cryptography can be very helpful for someone in this field.
Privacy Analyst
Privacy Analysts help organizations comply with privacy laws and regulations. They may also work on projects related to data privacy and security. A background in cryptography can be helpful for Privacy Analysts who work on projects related to data protection.
Forensic Scientist
Forensic Scientists collect, analyze, and interpret evidence to help solve crimes. They may work in a variety of settings, including crime labs and law enforcement agencies. A background in cryptography can be helpful for Forensic Scientists who work on cases involving digital evidence.
Computer Scientist
Computer Scientists conduct research in a variety of areas related to computing, including algorithm development, artificial intelligence, and computer architecture. Specialization in the area of cryptography is a common path to lead to work in the Cybersecurity field, where the expertise in this area is highly sought after.
Information Governance Analyst
Information Governance Analysts develop and implement policies and procedures to manage an organization's information assets. They may also work on projects related to data privacy and security. A background in cryptography can be helpful for Information Governance Analysts who work on projects related to data protection.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization. They may work in a variety of industries, including finance, insurance, and healthcare. A background in cryptography can be helpful for Risk Analysts who work on projects related to cybersecurity or data protection.
Software Engineer
Software Engineers design, develop, and test computer software. They may work on a variety of projects, from small personal apps to large enterprise systems. A background in cryptography can be helpful for Software Engineers who work on security-sensitive projects.
Intelligence Analyst
Intelligence Analysts collect, analyze, and interpret data to provide insights into threats and opportunities. They may work for governments, corporations, or other organizations that need to make informed decisions. A background in cryptography can be helpful for Intelligence Analysts who work on projects related to cybersecurity.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cryptography and Information Theory.
A comprehensive reference on cryptographic algorithms, protocols, and applications, with a focus on practical implementation.
Provides a comprehensive overview of information theory, inference, and learning algorithms, with a focus on probabilistic models and Bayesian inference.
Provides an accessible introduction to fundamentals of cryptography, including number theory, coding theory and discrete probability, and an overview of elliptic curve techniques and side-channel attacks.
A comprehensive guide to security engineering, including risk assessment, security design, and security testing.
A comprehensive textbook on cryptography and network security, covering a wide range of topics.
A practical guide to information security, covering a wide range of topics, including cryptography, access control, and security management.
Covers a wide range of cryptographic topics, including classical and modern algorithms, number theory, and cryptanalysis.
A practical guide to network security, including cryptography, firewalls, intrusion detection, and security assessment.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cryptography and Information Theory.
Cryptography Principles for IT Professionals and...
Security Architecture and Engineering: Cryptography for...
Cryptography: The Big Picture
Classical Cryptosystems and Core Concepts
Introduction to Cyber Security
Unlocking Information Security I: From Cryptography to...
406: Information Securi
Cybersecurity Compliance and System Administration
Blockchain Security
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser