We may earn an affiliate commission when you visit our partners.
Course image
Sang-Yoon Chang

Welcome to Symmetric Cryptography!

Read more

Welcome to Symmetric Cryptography!

Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes.

This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.

Enroll now

What's inside

Syllabus

Classical Cipher: Substitution
This module defines substitution cipher technique and describes multiple examples for substitution-based classical algorithms: Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher (which is a type of Polyalphabetic Cipher). We will also discuss the mathematical concepts in Modulo Operations to use them to describe the cipher algorithms.
Read more
Classical Cipher: Transposition
This module studies transposition cipher which, along with substitution cipher, provides a base technique for symmetric ciphers. We define transposition cipher and product cipher and discuss transposition examples in Rail Fence and Permutation Cipher.
Block Cipher and DES
This module is about modern ciphers based on product ciphers. We will first define block cipher and contrast it with stream cipher. We will then describe the ideal block cipher, which maximizes the number of transformations, and Feistel Cipher, which is a practical structure framework approximating the ideal block cipher. As a widely used cipher example based on the Feistel Cipher structure; we will study Data Encryption Standard (DES).
3-DES and AES
To provide stronger security than DES, modern symmetric ciphers can either use multiple ciphers or use an entirely different algorithm. This module reviews examples of each in Triple-DES and AES.
Block Cipher Operation Modes
Given a cipher and a key, this module reviews how to use block cipher operation modes when the data spans across multiple blocks. The module describes five popular operation modes: ECB, CBC, CFB, OFB, and CTR mode.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Describes classical substitution techniques, including Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher
Provides foundational knowledge in product ciphers and Feistel Cipher
Examines the widely used cipher algorithms DES, 3-DES, and AES
Explores block cipher operation modes: ECB, CBC, CFB, OFB, and CTR mode
Covers essential mathematical concepts, such as Modulo Operations, for understanding cipher algorithms
This course may require further prerequisite knowledge in cryptography to fully grasp the concepts

Save this course

Save Symmetric Cryptography to your list so you can find it easily later:
Save

Reviews summary

Comprehending symmetric encryption

Learners say this well-received course in Symmetric Cryptography by Sang-Yoon Chang effectively breaks down symmetric encryption concepts including different types of encryption schemes, DES, TDES, AES, cipher modes of operations, and message authentication algorithms such as CMAC, HMAC. Technically, this course could serve as a preparation for real-world applications. Reviewers praise the course for its clear explanations, engaging assignments, and helpful lectures, though some note that the mathematical side of symmetric cryptography is not fully covered. Overall, learners say this is a great course for anyone looking to understand symmetric cryptography.
Assignments strengthen understanding.
"course design is brilliant."
"The peer-graded assignments really helped me a lot in understanding the concepts more deeply."
"Well laid-out course! It covers the essentials of symmetric cryptography crisply."
Very highly rated!
"Million thanks to Sang-Yoon Chang for being great lecture for this wonderful online course."
"This course has deepened my interest in Cryptography."
"A great learning experience."
Concepts are explained well.
"The course was very helpful."
"Gives you a great explanation of the encryption algorithms and how they work"
"Theory is presented in an easy way to understand way."
Peer review can be slow.
"Too delayed to earn this certificate because of not reviewed in the peer-graded assignment."
"This is the only negative thing that I felt."
Math foundations could be stronger.
"Good for fundamental understanding, but lacks mathematical foundations."
"Certain concepts could have been explained in a bit more detail, so it is easier to understand certain quiz questions."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Symmetric Cryptography with these activities:
Substitution Cipher Practice
Strengthen your grasp of substitution ciphers by solving practice problems.
Show steps
  • Find online resources or textbooks with substitution cipher practice problems.
  • Practice decoding and encoding messages using different substitution methods.
Organize Course Materials
Establish a structured approach to organizing and reviewing course materials.
Show steps
  • Create a system for organizing lecture notes, assignments, and other materials.
  • Review organized materials regularly to reinforce concepts and identify areas for improvement.
Design a Transposition Cipher Wheel
Create a visual aid to enhance your understanding of transposition ciphers.
Show steps
  • Design a wheel with the alphabet arranged in a specific order.
  • Use the wheel to encrypt and decrypt messages, experimenting with different key sizes.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Understanding Block Cipher Modes of Operation
Review the different modes of operation for block ciphers, such as ECB, CBC, CFB, OFB, and CTR.
Show steps
  • Find online tutorials or videos explaining block cipher modes.
  • Follow the tutorials and take notes on the key differences between each mode.
  • Attempt practice problems or exercises to reinforce your understanding.
Practice Decrypting AES Encrypted Messages
Enhance your understanding of AES decryption by practicing with encrypted messages.
Browse courses on AES
Show steps
  • Find online resources or tools that provide encrypted messages.
  • Use the AES decryption algorithm to decrypt the messages using different key sizes and modes of operation.
Participate in Crypto Challenges
Test your skills by participating in online or offline crypto challenges.
Show steps
  • Identify crypto challenges that focus on symmetric cryptography.
  • Collaborate with peers or work independently to solve the challenges.
Cryptography and Network Security
Supplement your course material with an in-depth exploration of cryptography and its applications.
Show steps
  • Read through the book, focusing on the chapters relevant to symmetric cryptography.
  • Take notes and highlight key concepts.
  • Complete the practice exercises at the end of each chapter.

Career center

Learners who complete Symmetric Cryptography will develop knowledge and skills that may be useful to these careers:
Cryptographer
Cryptographers are responsible for developing and analyzing cryptographic algorithms and protocols used to protect information. This course will provide you with the foundational knowledge and skills needed to become a successful Cryptographer, including the mathematical concepts used to design and analyze cryptographic algorithms, the different types of symmetric cryptography algorithms, and their applications in real-world systems.
Information Security Analyst
Symmetric Cryptography is the most common form of encryption used to protect data in transit or at rest. As an Information Security Analyst, you will be responsible for designing, implementing, and maintaining security controls to protect an organization's information assets. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect data from unauthorized access, including various symmetric cryptography algorithms and their applications.
Software Engineer
Software Engineers who work on security-sensitive applications need to have a deep understanding of cryptography to ensure the confidentiality, integrity, and availability of the data they are working with. This course will provide you with the knowledge and skills needed to use symmetric cryptography to protect software applications from unauthorized access, including various symmetric cryptography algorithms and their applications in software development.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining the security of computer networks. This course will provide you with the knowledge and skills needed to use symmetric cryptography to protect network traffic from unauthorized access, including various symmetric cryptography algorithms and their applications in network security.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their information assets. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect data, including various symmetric cryptography algorithms and their applications in security consulting.
Forensic Analyst
Forensic Analysts are responsible for investigating computer crimes and recovering evidence from digital devices. This course will provide you with the knowledge and skills needed to use symmetric cryptography to analyze encrypted data and recover evidence, including various symmetric cryptography algorithms and their applications in forensic analysis.
Data Scientist
Data Scientists use statistical and mathematical techniques to analyze data and extract insights. Symmetric cryptography is often used to protect the confidentiality of sensitive data during analysis. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect data in data science applications, including various symmetric cryptography algorithms and their applications in data science.
Privacy Analyst
Privacy Analysts are responsible for ensuring that organizations comply with privacy regulations. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect personal data, including various symmetric cryptography algorithms and their applications in privacy analysis.
Information Technology Auditor
Information Technology Auditors are responsible for assessing the security of computer systems and networks. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to assess the security of systems and networks, including various symmetric cryptography algorithms and their applications in IT auditing.
System Administrator
System Administrators are responsible for maintaining computer systems and networks. Symmetric cryptography is often used to protect the confidentiality and integrity of data on systems and networks. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect systems and networks, including various symmetric cryptography algorithms and their applications in system administration.
Security Architect
Security Architects are responsible for designing and implementing security solutions for organizations. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to design and implement security solutions, including various symmetric cryptography algorithms and their applications in security architecture.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for monitoring and analyzing cybersecurity threats and vulnerabilities. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to analyze cybersecurity threats and vulnerabilities, including various symmetric cryptography algorithms and their applications in cybersecurity analysis.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to design and implement secure systems, including various symmetric cryptography algorithms and their applications in security engineering.
Network Architect
Network Architects are responsible for designing and implementing computer networks. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to design and implement secure networks, including various symmetric cryptography algorithms and their applications in network architecture.
IT Manager
IT Managers are responsible for planning, implementing, and managing IT systems and services. This course will provide you with the knowledge and skills needed to understand and use symmetric cryptography to protect IT systems and services, including various symmetric cryptography algorithms and their applications in IT management.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Symmetric Cryptography.
This comprehensive textbook provides a solid foundation in cryptography and network security, covering both theoretical concepts and practical applications. It valuable resource for students and professionals alike, with clear explanations and real-world examples.
This comprehensive handbook provides a wealth of information on all aspects of applied cryptography, including algorithms, protocols, and standards. It valuable resource for professionals in the field.
This advanced textbook provides a comprehensive overview of modern cryptography, covering both theoretical foundations and practical applications. It is suitable for graduate students and researchers in the field.
This advanced textbook provides a comprehensive treatment of modern cryptography, covering both theoretical foundations and practical applications. It is suitable for graduate students and researchers in the field.
This popular science book provides a fascinating and accessible introduction to cryptography, covering the history and evolution of ciphers. It great read for anyone interested in the subject.
This textbook provides a comprehensive overview of cryptography engineering, covering the design and implementation of secure systems. It valuable resource for students and professionals in the field.
This textbook provides a comprehensive overview of cryptography, covering both theoretical foundations and practical applications. It is suitable for undergraduate and graduate students in the field.
This textbook provides a comprehensive introduction to cryptography and coding theory, with a focus on mathematical foundations. It is suitable for undergraduate and graduate students in the field.
This textbook provides a comprehensive overview of coding theory, with a focus on its applications in information theory and cryptography. It is suitable for undergraduate and graduate students in the field.
This popular science book provides an accessible introduction to the mathematics underlying cryptography, with a focus on number theory. It great read for anyone interested in the subject.
This textbook provides a solid foundation in number theory, which is essential for understanding many cryptographic algorithms. It valuable resource for students and professionals in the field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Symmetric Cryptography.
409: Cryptograp
Most relevant
Basic Cryptography and Programming with Crypto API
Most relevant
Cyber Attack Countermeasures
Most relevant
Cryptographic Hash and Integrity Protection
Most relevant
Asymmetric Cryptography and Key Management
Most relevant
Decryption with Python
Most relevant
Introduction to Encryption and Cryptography
Most relevant
Cryptography: Boolean functions and related problems
Most relevant
Introduction to Encryption and Cryptography
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser