We may earn an affiliate commission when you visit our partners.
Course image
William Bahn, Richard White, and Sang-Yoon Chang

Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.

Enroll now

What's inside

Syllabus

Specialization Introduction
This module covers an introduction of the specialization and instructors, covers what to expect from this educational experience and also, an introduction to the course Classical Cryptosystems and Core Concepts.
Read more
Cryptographic Tidbits
In this module we present an introduction to cryptography, differentiate between codes and ciphers, describe cryptanalysis, and identify the guiding principles of modern cryptography. After completing this course you will be able to read material related to cryptographic systems, understanding the basic terminology and concepts. You will also have an appreciation for the historical framework of modern cryptography and the difficulty of achieving its aims.
Cryptanalysis
Delving deeper into cryptanalysis, in this module we will discuss different types of attacks, explain frequency analysis and different use cases, explain the significance of polyalphabetical ciphers, and discuss the Vigenere Cipher. When you have completed this module, you will have an appreciation of the different types of attacks and under what kinds of situations each might be applicable.
Hash Functions
Continuing on our exploration of the fundamental concept of cryptography, this module will explain the Hash Function, its purpose and application, potential attack vectors, and the importance of hash functions on cryptographic design. Upon completion you will be able to understand the role that hash functions play in cryptography and how cryptographic hash functions differ from other types of hash functions.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops core cybersecurity skills and knowledge in symmetric-key cryptography, public-key cryptography, authentication, and digital signatures
Suitable for beginners in cybersecurity with basic knowledge of computer science and math skills such as algebra and probability
Provides foundational coverage of classical cryptosystems, including basic concepts and cryptanalysis techniques
Addresses the growing demand for cybersecurity professionals, with an estimated 6 million new jobs expected by 2019
Taught by renowned instructors Richard White, Sang-Yoon Chang, and William Bahn

Save this course

Save Classical Cryptosystems and Core Concepts to your list so you can find it easily later:
Save

Reviews summary

Classical cryptosystems: engaging introduction

Learners say this is a largely positive course that offers a great introduction to the basics of cryptography and cryptosystems. The well-explained concepts are engaging and interesting, even for beginners. The instructor is knowledgeable and engaging, making the course enjoyable and worthwhile.
Course includes interesting historical concepts that make it engaging.
"Nice delivery of concepts. Interesting historical concepts was available which made it very engaging and educating. "
Instructor is knowledgeable and engaging.
"Very Good instructor Really tries to explain it so anyone can understand"
"The course and materials are really good. The concepts are explained very well"
Concepts are explained very clearly and nicely.
"The basics were explained very clearly and the References were also nice!"
"Everything was crystal clear but have to keep up with everything the professor says can't miss anything."
Course is well-suited for beginners.
"I really enjoyed the journey I would say. I loved the course and it was really detailed and easy to understand."
"Interesting course on an Interesting topic taken in a pleasant, enjoyable, and simple manner.Never did I feel bored or out of my depth even though I am a stranger to the topic."
Course may be too advanced for beginners.
"This course makes me know more about the history of cryptography and some other attacks precisely."
"Take this course at your own risk!! Although course rated beginner, topics taught are not meant for beginners."
Course could benefit from more examples and exercises.
"The lectures were all abstract. There was rarely examples used to visually show what concepts meant."
"The videos are way too long with too much info cramped up and there is no formative evaluation after each one."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Classical Cryptosystems and Core Concepts with these activities:
Read and annotate course materials
Annotate and summarize lessons to improve understanding and retention of core concepts.
Show steps
  • Read course syllabus and learning objectives
  • Review introductory materials and videos
  • Summarize key concepts in a notebook or digital document
  • Highlight important sections and make notes of questions
Build a toy cipher using pen and paper
Create a simple cipher to gain hands-on experience with encryption and decryption techniques.
Browse courses on Encryption
Show steps
  • Design a simple cipher algorithm with substitution or transposition
  • Create a key for the cipher
  • Encrypt and decrypt messages using the cipher
Read "Introduction to Cryptography" by Buchmann
Gain a comprehensive understanding of cryptographic concepts and techniques from a highly regarded textbook.
Show steps
  • Obtain a copy of the book
  • Read and understand the foundational chapters
  • Solve exercises and review key concepts regularly
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice solving cryptanalysis problems
Engage in problem-solving exercises to develop critical thinking and deepen understanding of cryptanalysis techniques.
Browse courses on Cryptanalysis
Show steps
  • Review lecture materials on cryptanalysis
  • Attempt practice problems involving frequency analysis
  • Solve exercises on breaking polyalphabetic ciphers
  • Analyze different types of ciphertext attacks
Follow online tutorials on hash functions
Explore interactive tutorials to enhance understanding of the principles and applications of hash functions.
Browse courses on Hash Functions
Show steps
  • Identify reputable online resources and tutorials
  • Review introductory materials on hash function concepts
  • Follow step-by-step instructions to implement hash functions
Attend online meetups or conferences related to cryptography
Connect with professionals and learn about current trends and advancements in the field of cryptography.
Browse courses on Cybersecurity
Show steps
  • Identify relevant online events and conferences
  • Register and prepare for active participation
  • Attend sessions and engage with speakers and attendees
Design and implement a basic cryptographic algorithm
Apply knowledge of cryptographic principles to implement an algorithm that demonstrates encryption and decryption.
Show steps
  • Choose a specific cipher algorithm like AES or RSA
  • Develop a plan for implementation, including key generation
  • Code and test the algorithm using a programming language
  • Evaluate the performance and security of the implementation
Write a blog post or article on a specific cryptography topic
Deepen understanding and reinforce knowledge by explaining a chosen topic to a broader audience.
Browse courses on Cryptographic Algorithms
Show steps
  • Select a specific cryptography topic of interest
  • Research and gather relevant information
  • Organize and write the content in a clear and engaging manner
  • Share the blog post or article on online platforms

Career center

Learners who complete Classical Cryptosystems and Core Concepts will develop knowledge and skills that may be useful to these careers:
Cryptography Engineer
Cryptography Engineers are cybersecurity professionals who specialize in cryptography to protect information from unauthorized access, ensuring the confidentiality, integrity, and availability of data. This course covers fundamental cryptographic concepts such as cryptography, cryptanalysis, hash functions, and digital signatures, providing the foundation for understanding cryptographic systems design and implementation. It helps aspiring Cryptography Engineers build a strong foundation in cryptography and cryptanalysis, essential for success in this role.
Network Security Engineer
Network Security Engineers protect computer networks from unauthorized access and attacks by implementing security measures such as firewalls, intrusion detection and prevention systems, and encryption. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, providing a solid foundation for understanding network security mechanisms. It helps aspiring Network Security Engineers build a strong understanding of cryptography, enabling them to design, implement, and maintain secure networks.
Cybersecurity Analyst
Cybersecurity Analysts protect organizations from cyber threats by identifying, analyzing, and responding to security incidents. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, providing a foundation for understanding cybersecurity threats and defense mechanisms. It helps aspiring Cybersecurity Analysts build a strong foundation in cryptography, enabling them to effectively analyze and respond to cyber threats.
Forensic Computer Analyst
Forensic Computer Analysts recover and analyze electronic data from computers and other devices to support investigations. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, which are often used in digital forensics to protect and analyze evidence. It helps aspiring Forensic Computer Analysts build a foundation in cryptography, enabling them to understand the encryption methods commonly encountered in digital forensics and to analyze encrypted evidence effectively.
Information Security Manager
Information Security Managers develop and implement security policies and procedures to protect organizations from cyber threats. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and digital signatures, providing a solid foundation for understanding information security principles. It helps aspiring Information Security Managers build a strong understanding of cryptography, enabling them to effectively manage and protect information assets.
Software Developer (Security)
Software Developers (Security) specialize in developing and maintaining software applications with strong security features. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, providing a foundation for understanding secure software development practices. It helps aspiring Software Developers (Security) build a strong foundation in cryptography, enabling them to design and implement secure software.
Cloud Security Architect
Cloud Security Architects design and implement security measures for cloud computing environments. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and digital signatures, providing a foundation for understanding security mechanisms in cloud computing. It helps aspiring Cloud Security Architects build a strong understanding of cryptography, enabling them to effectively design and implement secure cloud architectures.
Data Scientist
Data Scientists analyze large datasets to extract valuable insights and make predictions. This course covers fundamental cryptography concepts, including hash functions, which are used in data science for data integrity and security. It helps aspiring Data Scientists build a basic understanding of cryptography, enabling them to work with encrypted data and to understand the implications of data privacy and security.
IT Auditor
IT Auditors assess the effectiveness of an organization's IT systems and controls to ensure compliance with regulations and standards. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and digital signatures, providing a foundation for understanding the security aspects of IT systems. It helps aspiring IT Auditors build a basic understanding of cryptography, enabling them to effectively audit and assess IT security measures.
Information Systems Security Officer (ISSO)
Information Systems Security Officers (ISSOs) are responsible for developing and implementing information security policies and procedures to protect organizations from cyber threats. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and digital signatures, providing a solid foundation for understanding information security principles. It helps aspiring ISSOs build a strong understanding of cryptography, enabling them to effectively manage and protect information assets.
Security Consultant
Security Consultants provide organizations with expert advice and guidance on cybersecurity threats and defense mechanisms. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, providing a foundation for understanding cybersecurity risks and solutions. It helps aspiring Security Consultants build a basic understanding of cryptography, enabling them to effectively analyze and advise on cybersecurity measures.
Systems Analyst
Systems Analysts analyze and design computer systems to meet the needs of organizations. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, providing a foundation for understanding the security aspects of computer systems. It helps aspiring Systems Analysts build a basic understanding of cryptography, enabling them to effectively design and implement secure systems.
IT Risk Manager
IT Risk Managers assess and manage risks associated with information technology systems and processes. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and digital signatures, providing a foundation for understanding IT risk assessment and mitigation. It helps aspiring IT Risk Managers build a basic understanding of cryptography, enabling them to effectively analyze and manage IT risks.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's information systems and data. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and digital signatures, providing a solid foundation for understanding cybersecurity threats and defense mechanisms. It may help aspiring CISOs build a basic understanding of cryptography, contributing to their ability to make informed decisions on cybersecurity strategy and risk management.
Security Architect
Security Architects design and implement security solutions to protect organizations from cyber threats. This course covers fundamental cryptography concepts, including cryptanalysis, symmetric and asymmetric cryptography, and hash functions, providing a foundation for understanding cybersecurity threats and defense mechanisms. It may help aspiring Security Architects build a basic understanding of cryptography, contributing to their ability to design and implement effective security solutions.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Classical Cryptosystems and Core Concepts.
Provides a comprehensive overview of classical and modern cryptography, with a strong emphasis on coding theory. It covers topics such as symmetric-key cryptography, public-key cryptography, hash functions, and digital signatures.
Practical guide to cryptography, with a focus on the algorithms and protocols used in real-world applications. It covers topics such as symmetric-key cryptography, public-key cryptography, hash functions, and digital signatures.
Comprehensive textbook on cryptography and network security, with a focus on the practical aspects of the subject. It covers topics such as symmetric-key cryptography, public-key cryptography, hash functions, digital signatures, and network security protocols.
Popular science book on cryptography, with a focus on the history of the subject. It covers topics such as ancient cryptography, medieval cryptography, and modern cryptography.
Comprehensive reference book on cryptography, with a focus on the mathematical foundations of the subject. It covers topics such as symmetric-key cryptography, public-key cryptography, hash functions, digital signatures, and cryptanalysis.
Graduate-level textbook on the foundations of cryptography, with a focus on the basic tools of the subject. It covers topics such as probability theory, information theory, and computational complexity.
Graduate-level textbook on the foundations of cryptography, with a focus on the basic applications of the subject. It covers topics such as symmetric-key cryptography, public-key cryptography, hash functions, and digital signatures.
Graduate-level textbook on coding theory, with a focus on the information theory of communications. It covers topics such as error-correcting codes, cryptography, and network coding.
Undergraduate-level textbook on automata theory, languages, and computation. It covers topics such as finite automata, regular expressions, context-free grammars, and Turing machines.
Textbook on modern cryptography, with a focus on the theory and practice of the subject. It covers topics such as symmetric-key cryptography, public-key cryptography, hash functions, digital signatures, and cryptanalysis.
Is an introduction to the mathematics used in cryptography, with a focus on the basic algebraic and number-theoretic concepts. It covers topics such as modular arithmetic, elliptic curves, and finite fields.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Classical Cryptosystems and Core Concepts.
Cybersecurity Specialist Capstone
Most relevant
Practice Exam for ISC2 Certified in Cybersecurity (CC)
Most relevant
Cybersecurity Compliance Framework & System Administration
Cybersecurity Architecture
Cybersecurity Compliance and System Administration
Friendship machine: forming a new type of human...
Cybersecurity Essentials
QC101 Quantum Computing & Intro to Quantum Machine...
Front-End Development Capstone Project
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser