We may earn an affiliate commission when you visit our partners.
Course image
Dave Evans

Cryptography is present in everyday life. Take Udacity's Applied Cryptography course and learn all about making and breaking puzzles in computing. Learn online with Udacity.

What's inside

Syllabus

Lesson 1
Problem Set 1
Q & A Session 1
Lesson 2
Read more
Problem Set 2
Q & A Session 2
Lesson 3
Problem Set 3
Q & A Session 3
Lesson 4
Problem Set 4
Lesson 5
Problem Set 5
Lesson 6
Problem Set 6
Problem Set 6 Solutions
Lesson 7
Interview on GSM Cracking
Final Assessment

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces cryptography, a fundamental topic in computer science
Provides hands-on practice through problem sets and Q&A sessions
Taught by Dave Evans, an experienced instructor in cryptography
Includes an interview on GSM cracking, providing real-world insights
May require some background knowledge in mathematics and computing

Save this course

Save Applied Cryptography to your list so you can find it easily later:
Save

Reviews summary

Well-regarded cryptography course

For students with previous programming experience, this course is highly recommended for getting started with cryptography. Its short lectures and multiple-choice questions will give you a solid foundation in this foundational topic.
You will be introduced to cybersecurity concepts. The different aspects are touched on and it is recommended to all students.
"Complete the course , good introduction to cyber security."
"Touches different aspects."
"I recommend this course to every student interested in learning Cryptography."
This course provides critical thinking about cryptography. It also prepares you for more in-depth learning.
"After this course, I developed the ability to critically think about cryptographic protocols and primitives."
"I am also ready for classes that go in greater depth."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Applied Cryptography with these activities:
Explore Advanced Encryption Algorithms
Expand your knowledge by exploring advanced encryption algorithms, such as AES, RSA, and elliptic curve cryptography.
Show steps
  • Find online tutorials or courses that teach advanced encryption algorithms
  • Follow along with video demonstrations or written guides to understand the implementation details
  • Practice implementing the algorithms in a programming language of your choice
  • Experiment with different key sizes and modes of operation to observe their impact on security
Develop a Cryptography Toolkit
Solidify your knowledge by applying cryptographic principles to a practical project, such as developing a toolkit for encrypting and decrypting files or messages.
Show steps
  • Choose a programming language and development environment
  • Implement basic encryption and decryption algorithms
  • Integrate additional features such as key management and secure communication
  • Test and refine your toolkit for different scenarios
  • Share your toolkit with others or showcase it in a portfolio
Show all two activities

Career center

Learners who complete Applied Cryptography will develop knowledge and skills that may be useful to these careers:
Cryptographer
Cryptography is the practice of using techniques to ensure secure communication in the presence of adversarial behavior. Cryptographers build and analyze protocols that prevent unauthorized parties from accessing private messages. As an Applied Cryptographer, you will learn essential concepts like encryption, decryption, hashing, digital signatures, and key exchange. This knowledge will help you in developing secure systems and protecting sensitive information.
Software Engineer
Software Engineers design, develop, and maintain software systems. Those working on encryption systems will be responsible for implementing cryptographic algorithms and protocols. As an Applied Cryptographer, you will learn principles in cryptography essential for Software Engineers. This course will help you understand concepts like encryption, decryption, hashing, and digital signatures, giving you the foundation to work on secure software systems.
Security Analyst
Security Analysts plan and implement security measures to protect an organization's computer networks and systems. Those specializing in cryptography will be responsible for analyzing and implementing cryptographic algorithms and protocols. As an Applied Cryptographer, you will not only learn cryptographic concepts but also develop essential analytical skills. This course will help you build a strong foundation in cryptography, making you a more effective Security Analyst.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security. They are responsible for protecting networks from unauthorized access and attacks. As an Applied Cryptographer, you will learn fundamental principles in cryptography. This knowledge will be essential when designing and implementing secure networks.
IT Security Specialist
IT Security Specialists are responsible for protecting an organization's information technology systems from unauthorized access, use, disclosure, disruption, modification, or destruction. As an Applied Cryptographer, you will learn cryptographic techniques and protocols. This knowledge will be valuable in securing IT systems and protecting sensitive data.
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's information security program. They are responsible for ensuring the confidentiality, integrity, and availability of information. As an Applied Cryptographer, you will learn the principles and practices of cryptography. This knowledge will be essential in managing and securing information systems.
Computer Hardware Engineer
Computer Hardware Engineers design, develop, and test computer hardware. Those specializing in security will be responsible for implementing cryptographic algorithms and protocols in hardware. As an Applied Cryptographer, you will learn essential concepts like encryption, decryption, hashing, and digital signatures. This knowledge will be valuable in designing and developing secure computer hardware.
Data Scientist
Data Scientists use scientific methods, processes, algorithms, and systems to extract knowledge and insights from data in various forms, both structured and unstructured. As an Applied Cryptographer, you will learn essential concepts like encryption, decryption, hashing, and digital signatures. This knowledge will be valuable in securing data and developing secure data science applications.
Cloud Security Architect
Cloud Security Architects are responsible for designing, implementing, and managing cloud security. They are responsible for protecting cloud-based systems and data from unauthorized access and attacks. As an Applied Cryptographer, you will learn fundamental principles in cryptography. This knowledge will be essential in designing and implementing secure cloud architectures.
Security Consultant
Security Consultants provide professional advice and guidance on security matters to organizations. They help organizations assess their security risks, develop security strategies, and implement security measures. As an Applied Cryptographer, you will learn about various cryptographic algorithms, protocols, and techniques. This knowledge will equip you to provide expert advice on cryptography and security to organizations.
Blockchain Developer
Blockchain Developers design, develop, and maintain blockchain-based systems. They are responsible for implementing cryptographic algorithms and protocols to ensure the security and integrity of blockchain networks. As an Applied Cryptographer, you will learn the fundamental principles of cryptography. This knowledge will be essential when designing and developing secure blockchain systems.
Software Tester
Software Testers are responsible for testing software systems to ensure they meet requirements and function as expected. Those specializing in security testing will be responsible for testing the security of software systems. As an Applied Cryptographer, you will learn about various cryptographic algorithms and protocols. This knowledge will be valuable in evaluating the security of software systems and identifying vulnerabilities.
Forensic Analyst
Forensic Analysts investigate computer systems and networks to gather evidence of criminal activity. They use a variety of techniques to analyze data and uncover hidden information. As an Applied Cryptographer, you will learn about various cryptographic algorithms and protocols. This knowledge will be valuable in analyzing encrypted data and uncovering hidden messages.
Risk Analyst
Risk Analysts identify, assess, and manage risks to an organization. They develop and implement strategies to mitigate risks and protect the organization from financial loss, legal liability, and reputational damage. As an Applied Cryptographer, you will learn about various cryptographic algorithms and protocols. This knowledge will be valuable in assessing the risks associated with cryptography and developing strategies to mitigate these risks.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain cybersecurity systems to protect organizations from cyber threats. They use a variety of techniques to prevent, detect, and respond to cyber attacks. As an Applied Cryptographer, you will learn about various cryptographic algorithms and protocols. This knowledge will be valuable in designing and implementing secure cybersecurity systems.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Applied Cryptography.
Is an industry standard and widely referenced. As such it would serve as an invaluable reference text and resource for additional reading.
The book covers a wide range of topics that are highly relevant to this course. As such it would be an excellent reference text for those who wish to dig deeper into the subject.
Provides a comprehensive overview of modern cryptography theory and practice. It is an excellent reference for those who wish to gain a deeper understanding of the subject.
Provides a comprehensive overview of computer security concepts and practices.
For those who wish to dive deep into the subject of ECC, this book is the undisputed definitive text on the subject.
Is an excellend overview of cryptography, covering both the history and the latest developments. It is written in an accessible style, suitable for beginners and experts alike.
Provides a comprehensive overview of network security concepts and standards.
Is not directly related to the subject of cryptography, but provides a solid foundation for understanding the underlying infrastructure upon which many modern applications rely.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser