We may earn an affiliate commission when you visit our partners.
Take this course
Sang-Yoon Chang

Welcome to Symmetric Cryptography!

Read more

Welcome to Symmetric Cryptography!

Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes.

This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.

Enroll now

What's inside

Syllabus

Classical Cipher: Substitution
This module defines substitution cipher technique and describes multiple examples for substitution-based classical algorithms: Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher (which is a type of Polyalphabetic Cipher). We will also discuss the mathematical concepts in Modulo Operations to use them to describe the cipher algorithms.
Read more

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Describes classical substitution techniques, including Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher
Provides foundational knowledge in product ciphers and Feistel Cipher
Examines the widely used cipher algorithms DES, 3-DES, and AES
Explores block cipher operation modes: ECB, CBC, CFB, OFB, and CTR mode
Covers essential mathematical concepts, such as Modulo Operations, for understanding cipher algorithms
This course may require further prerequisite knowledge in cryptography to fully grasp the concepts

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Foundations of symmetric cryptography

According to learners, this course provides a solid foundation in symmetric cryptography, covering key algorithms like DES and AES, and essential concepts such as block cipher modes. Many students found the lectures clear and well-structured, making complex topics accessible. While some mention the course being mathematically rigorous, most appreciate its depth and academic quality, particularly for those with a technical background. The course is seen as a valuable starting point for understanding cryptographic principles.
Suitable for technical/academic audience.
"This course is great for those with a technical or engineering background."
"It feels like a proper university course, providing academic depth."
"Requires a certain level of mathematical comfort, but rewarding if you do."
"The level of detail is appropriate for students pursuing related technical fields."
Effectively covers core symmetric algorithms.
"DES and AES explanations were particularly insightful."
"The coverage of block cipher modes was comprehensive and very useful."
"I appreciated the detailed look at classical ciphers as a historical context."
"The modules on 3-DES and AES were well-structured and informative."
Lectures are easy to follow and understand.
"The course is extremely easy to understand and the lectures are clear and concise."
"Lectures explain complex topics in a clear and digestible manner."
"The instructor's explanations are very clear, which made learning complex topics much easier."
"I found the video lectures well-explained and easy to follow."
Provides a strong base in crypto concepts.
"This course provides a really solid foundation on Symmetric Cryptography."
"It gives the essential and necessary knowledge about symmetric cryptography."
"The course is excellent in providing a solid foundation in symmetric crypto algorithms and techniques."
"I feel I have a solid understanding of the fundamentals after completing this course."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Symmetric Cryptography with these activities:
Substitution Cipher Practice
Strengthen your grasp of substitution ciphers by solving practice problems.
Show steps
  • Find online resources or textbooks with substitution cipher practice problems.
  • Practice decoding and encoding messages using different substitution methods.
Organize Course Materials
Establish a structured approach to organizing and reviewing course materials.
Show steps
  • Create a system for organizing lecture notes, assignments, and other materials.
  • Review organized materials regularly to reinforce concepts and identify areas for improvement.
Design a Transposition Cipher Wheel
Create a visual aid to enhance your understanding of transposition ciphers.
Show steps
  • Design a wheel with the alphabet arranged in a specific order.
  • Use the wheel to encrypt and decrypt messages, experimenting with different key sizes.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Understanding Block Cipher Modes of Operation
Review the different modes of operation for block ciphers, such as ECB, CBC, CFB, OFB, and CTR.
Show steps
  • Find online tutorials or videos explaining block cipher modes.
  • Follow the tutorials and take notes on the key differences between each mode.
  • Attempt practice problems or exercises to reinforce your understanding.
Practice Decrypting AES Encrypted Messages
Enhance your understanding of AES decryption by practicing with encrypted messages.
Browse courses on AES
Show steps
  • Find online resources or tools that provide encrypted messages.
  • Use the AES decryption algorithm to decrypt the messages using different key sizes and modes of operation.
Participate in Crypto Challenges
Test your skills by participating in online or offline crypto challenges.
Show steps
  • Identify crypto challenges that focus on symmetric cryptography.
  • Collaborate with peers or work independently to solve the challenges.
Cryptography and Network Security
Supplement your course material with an in-depth exploration of cryptography and its applications.
Show steps
  • Read through the book, focusing on the chapters relevant to symmetric cryptography.
  • Take notes and highlight key concepts.
  • Complete the practice exercises at the end of each chapter.

Career center

Learners who complete Symmetric Cryptography will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Symmetric Cryptography is the most common form of encryption used to protect data in transit or at rest. As an Information Security Analyst, you will be responsible for designing, implementing, and maintaining security controls to protect an organization's information assets. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect data from unauthorized access, including various symmetric cryptography algorithms and their applications.
Cryptographer
Cryptographers are responsible for developing and analyzing cryptographic algorithms and protocols used to protect information. This course will provide you with the foundational knowledge and skills needed to become a successful Cryptographer, including the mathematical concepts used to design and analyze cryptographic algorithms, the different types of symmetric cryptography algorithms, and their applications in real-world systems.
Software Engineer
Software Engineers who work on security-sensitive applications need to have a deep understanding of cryptography to ensure the confidentiality, integrity, and availability of the data they are working with. This course will provide you with the knowledge and skills needed to use symmetric cryptography to protect software applications from unauthorized access, including various symmetric cryptography algorithms and their applications in software development.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining the security of computer networks. This course will provide you with the knowledge and skills needed to use symmetric cryptography to protect network traffic from unauthorized access, including various symmetric cryptography algorithms and their applications in network security.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their information assets. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect data, including various symmetric cryptography algorithms and their applications in security consulting.
Forensic Analyst
Forensic Analysts are responsible for investigating computer crimes and recovering evidence from digital devices. This course will provide you with the knowledge and skills needed to use symmetric cryptography to analyze encrypted data and recover evidence, including various symmetric cryptography algorithms and their applications in forensic analysis.
Data Scientist
Data Scientists use statistical and mathematical techniques to analyze data and extract insights. Symmetric cryptography is often used to protect the confidentiality of sensitive data during analysis. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect data in data science applications, including various symmetric cryptography algorithms and their applications in data science.
Information Technology Auditor
Information Technology Auditors are responsible for assessing the security of computer systems and networks. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to assess the security of systems and networks, including various symmetric cryptography algorithms and their applications in IT auditing.
Privacy Analyst
Privacy Analysts are responsible for ensuring that organizations comply with privacy regulations. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect personal data, including various symmetric cryptography algorithms and their applications in privacy analysis.
System Administrator
System Administrators are responsible for maintaining computer systems and networks. Symmetric cryptography is often used to protect the confidentiality and integrity of data on systems and networks. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect systems and networks, including various symmetric cryptography algorithms and their applications in system administration.
Security Architect
Security Architects are responsible for designing and implementing security solutions for organizations. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to design and implement security solutions, including various symmetric cryptography algorithms and their applications in security architecture.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for monitoring and analyzing cybersecurity threats and vulnerabilities. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to analyze cybersecurity threats and vulnerabilities, including various symmetric cryptography algorithms and their applications in cybersecurity analysis.
IT Manager
IT Managers are responsible for planning, implementing, and managing IT systems and services. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect IT systems and services, including various symmetric cryptography algorithms and their applications in IT management.
Network Architect
Network Architects are responsible for designing and implementing computer networks. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to design and implement secure networks, including various symmetric cryptography algorithms and their applications in network architecture.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to design and implement secure systems, including various symmetric cryptography algorithms and their applications in security engineering.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Symmetric Cryptography.
This comprehensive textbook provides a solid foundation in cryptography and network security, covering both theoretical concepts and practical applications. It valuable resource for students and professionals alike, with clear explanations and real-world examples.
This comprehensive handbook provides a wealth of information on all aspects of applied cryptography, including algorithms, protocols, and standards. It valuable resource for professionals in the field.
This advanced textbook provides a comprehensive overview of modern cryptography, covering both theoretical foundations and practical applications. It is suitable for graduate students and researchers in the field.
This advanced textbook provides a comprehensive treatment of modern cryptography, covering both theoretical foundations and practical applications. It is suitable for graduate students and researchers in the field.
This popular science book provides a fascinating and accessible introduction to cryptography, covering the history and evolution of ciphers. It great read for anyone interested in the subject.
This textbook provides a comprehensive overview of cryptography engineering, covering the design and implementation of secure systems. It valuable resource for students and professionals in the field.
This textbook provides a comprehensive overview of cryptography, covering both theoretical foundations and practical applications. It is suitable for undergraduate and graduate students in the field.
This textbook provides a comprehensive introduction to cryptography and coding theory, with a focus on mathematical foundations. It is suitable for undergraduate and graduate students in the field.
This textbook provides a comprehensive overview of coding theory, with a focus on its applications in information theory and cryptography. It is suitable for undergraduate and graduate students in the field.
This popular science book provides an accessible introduction to the mathematics underlying cryptography, with a focus on number theory. It great read for anyone interested in the subject.
This textbook provides a solid foundation in number theory, which is essential for understanding many cryptographic algorithms. It valuable resource for students and professionals in the field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser