Applied Cryptography

بواسطة: Udacity

Overview

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Syllabus

  • Perfect Ciphers
    • What makes certain ciphers perfect.,How the Lorenz Cipher was broken.
  • Symmetric Encryption
    • Sending messages when two people share a secret.
  • Key Exchange
    • Techniques to establish a shared secret.
  • Asymmetric Encryption
    • Exchanging information using public key cryptosystems.
  • Public Key Protocols
    • Encrypted key exchange, certificates, secure commerce.
  • Using Cryptographic Primitives
    • How cryptography can be useful for anonymizing communication, voting, and digital cash.
  • Secure Computation
    • Computing without exposing data.

Taught by

David Evans

Applied Cryptography
الذهاب الي الدورة

Applied Cryptography

بواسطة: Udacity

  • Udacity
  • مجانية
  • الإنجليزية
  • متاح شهادة
  • متاح في أي وقت
  • advanced
  • N/A