We may earn an affiliate commission when you visit our partners.
Course image
Diane Dowling and Mac Bowley

This online course from the Raspberry Pi Foundation explores encryption and cryptography. You'll learn about what encryption is and how it was used in the past, and use the Caesar and Vigenère ciphers. You'll also look at modern encryption, and investigate both symmetric and asymmetric encryption schemes. The course also takes a look at the future of encryption, and includes several practical encryption activities that are also appropriate to use in the classroom.

Read more

This online course from the Raspberry Pi Foundation explores encryption and cryptography. You'll learn about what encryption is and how it was used in the past, and use the Caesar and Vigenère ciphers. You'll also look at modern encryption, and investigate both symmetric and asymmetric encryption schemes. The course also takes a look at the future of encryption, and includes several practical encryption activities that are also appropriate to use in the classroom.

What you'll learn

Over the following two weeks, you will:

  • Describe the general process of encryption and decryption
  • Apply a Caesar cipher and a Vigenère cipher
  • Discuss the advantages and disadvantages of different encryption algorithms
  • Compare symmetric and asymmetric encryption
  • Demonstrate methods of breaking simple encryption schemes
  • Describe how encryption is used in the modern world, and some of the possible ethical implications of this

What's inside

Learning objectives

  • Describe the general process of encryption and decryption
  • Apply a caesar cipher and a vigenère cipher
  • Discuss the advantages and disadvantages of different encryption algorithms
  • Compare symmetric and asymmetric encryption
  • Demonstrate methods of breaking simple encryption schemes
  • Describe how encryption is used in the modern world, and some of the possible ethical implications of this

Syllabus

The course will cover:
A brief look at the history of encryption
The encryption and decryption process, and the importance of keys
The Caesar and Vigenère ciphers
Read more
Symmetric and asymmetric encryption schemes
Public-key encryption in the real world
An introduction to quantum cryptography
Practical encryption activities

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers encryption, a core skill in several areas of cybersecurity
Teaches the history of encryption, a foundation for understanding modern uses
Develops skills in breaking simple encryption schemes, a basis for penetration testing and security auditing
Taught by recognized experts with certifications in the field of cryptography
Examines the ethical implications of encryption, an essential aspect for working in cybersecurity
Includes hands-on labs and interactive materials, fostering comprehension and retention

Save this course

Save Introduction to Encryption and Cryptography to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Introduction to Encryption and Cryptography with these activities:
Create a notebook of notes, assignments, quizzes, and exams
Creating a notebook of notes, assignments, quizzes, and exams will help you to organize your learning materials and ensure that you have all of the resources you need to prepare for assessments.
Show steps
  • Gather your course materials, including notes, assignments, quizzes, and exams.
  • Organize your materials into a notebook, using dividers or tabs to separate different sections.
  • Review your materials regularly to reinforce your learning.
Review and summarize 'Applied Cryptography' by Bruce Schneier
This book lays out some of the main ideas behind modern cryptography. Summarizing the book will help you better understand and retain the key themes and concepts of modern cryptosystems.
Show steps
  • Read selected chapters and take notes on important topics.
  • Write a 1-page summary of each chapter.
  • Present your summary to the class.
Review key concepts from previous courses on mathematics and computer science
This course builds upon key concepts from previous courses on mathematics and computer science. Reviewing these concepts will help you to refresh your knowledge and ensure that you have the necessary foundation to succeed in this course.
Browse courses on Mathematics
Show steps
  • Review your notes and textbooks from previous courses on mathematics and computer science.
  • Complete practice problems and exercises to test your understanding of the key concepts.
  • Attend office hours or meet with your instructor to ask any questions that you have.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice using a programming language to solve simple problems
This course requires you to be able to use a programming language to solve simple problems. Practicing your programming skills will help you to refresh your knowledge and ensure that you are prepared for the coursework.
Browse courses on Programming
Show steps
  • Choose a programming language and find a set of practice problems online or in a textbook.
  • Solve the practice problems using the chosen programming language.
  • Check your answers against the provided answer key or discuss your solutions with your classmates or instructor.
Practice solving simple encryption and decryption problems by hand
Practicing solving these problems will help you better understand the process of encryption and decryption, and will improve your ability to apply encryption algorithms in practice.
Browse courses on Caesar Cipher
Show steps
  • Find a set of practice problems online or in a textbook.
  • Solve the problems by hand, using the relevant encryption algorithm.
  • Check your answers against the provided answer key.
Create a visual representation of different encryption algorithms
Creating a visual representation of different encryption algorithms will help you better understand how they work and how they differ from each other.
Browse courses on Encryption Algorithms
Show steps
  • Choose a set of encryption algorithms to represent.
  • Research how each algorithm works.
  • Create a visual representation of each algorithm, using a whiteboard, paper, or digital tools.
  • Present your visual representations to the class.
Implement a simple encryption algorithm in a programming language
Implementing a simple encryption algorithm in code will give you a hands-on understanding of how encryption works and will help you better understand the strengths and weaknesses of different algorithms.
Browse courses on Encryption Algorithms
Show steps
  • Choose an encryption algorithm to implement.
  • Learn the basics of the chosen programming language.
  • Implement the encryption algorithm in the chosen programming language.
  • Test your implementation with a variety of inputs.
Follow online tutorials to learn about quantum cryptography
Quantum cryptography is a rapidly developing field, and online tutorials can help you learn about the latest advances in this area.
Browse courses on Quantum Cryptography
Show steps
  • Find a set of online tutorials on quantum cryptography.
  • Follow the tutorials, taking notes on the key concepts and ideas.
  • Discuss the tutorials with your classmates or instructor.

Career center

Learners who complete Introduction to Encryption and Cryptography will develop knowledge and skills that may be useful to these careers:
Information Assurance Analyst
Information Assurance Analysts assess and manage security risks to an organization's information systems. This course provides a strong foundation in encryption and cryptography, which are essential for Information Assurance Analysts.
Security Consultant
Security Consultants provide security advice and services to organizations. This course provides a strong foundation in encryption and cryptography, which are essential for Security Consultants.
Cryptography Engineer
Cryptography Engineers design, implement, and maintain encryption and cryptography systems. This course provides a strong foundation in the field of cryptography, which is essential for Cryptography Engineers.
Cryptographer
Cryptographers play a key role in developing and implementing encryption and cryptography systems to protect sensitive data.
Cyber Security Analyst
Cyber Security Analysts plan and implement security measures to protect an organization's computer networks and systems. This course may be useful as it provides a foundation in encryption and cryptography, which are essential for protecting data in the digital age.
Information Security Analyst
Information Security Analysts help to protect an organization's information assets, such as data, applications, and networks. This course may be useful as it provides an understanding of encryption and cryptography, which are essential for protecting data in the digital age.
Ethical Hacker
Ethical hackers use their skills to identify and exploit vulnerabilities in computer systems in order to improve security. This course may be useful as it provides a foundation in encryption and cryptography, which are essential for ethical hackers.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. This course may be useful as it provides a foundation in encryption and cryptography, which are essential for protecting networks in the digital age.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security measures for cloud computing environments. This course may be useful as it provides a foundation in encryption and cryptography, which are essential for protecting data in the cloud.
Data Scientist
Data Scientists use mathematical and statistical methods to extract knowledge from data. This course may be useful as it provides a foundation in encryption and cryptography, which are becoming increasingly important in the field of data science.
Software Engineer
Software Engineers design, develop, and test software applications. This course may be useful as it provides a foundation in encryption and cryptography, which are becoming increasingly important in the software industry.
Financial Analyst
Financial Analysts analyze financial data and make investment recommendations. This course may be useful as it provides a foundation in encryption and cryptography, which are becoming increasingly important in the financial industry.
Accountant
Accountants analyze financial data and prepare financial statements. This course may be useful as it provides a foundation in encryption and cryptography, which are becoming increasingly important in the accounting industry.
Forensic Scientist
Forensic Scientists use scientific methods to analyze evidence in criminal investigations. This course may be useful as it provides a foundation in encryption and cryptography, which are becoming increasingly important in the field of forensic science.
Risk Analyst
Risk Analysts identify and assess risks to an organization. This course may be useful as it provides a foundation in encryption and cryptography, which are becoming increasingly important in the field of risk management.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Introduction to Encryption and Cryptography.
Covers the full range of modern cryptography, from basic concepts to the latest developments, with a focus on real-world applications. More comprehensive and in-depth than the course.
Provides a comprehensive overview of both cryptography and coding theory, with a focus on the mathematical foundations. Suitable for learners with a strong mathematical background.
Provides a comprehensive and up-to-date introduction to cryptography, covering both theoretical foundations and practical applications. Suitable for advanced learners and researchers.
Covers various aspects of computer security and cryptography, including encryption algorithms, network security, and security protocols. Suitable as a textbook for introductory courses.
A popular science book that explores the history and evolution of cryptography in an engaging and accessible way. Provides historical context and background knowledge.
Provides a comprehensive overview of network security, covering both theoretical concepts and practical applications. More focused on network security than general cryptography.
Covers a wide range of security topics, including cryptography, network security, and software security. Provides a broad overview of security concepts and practices.
A true story about a computer security incident that highlights the importance of encryption and cryptography in protecting sensitive information. Provides real-world context and historical perspective.
Provides insights into the human factors of security and explores how attackers use social engineering and deception techniques to compromise systems. Relates to the ethical implications of encryption.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser