Applied Cryptography

开始时间: 随时 持续时间: 自主

所在平台: Udacity

课程类别: 计算机科学

大学或机构: Udacity Self

   

课程主页: https://www.udacity.com/course/cs387

Explore 1600+ online courses from top universities. Join Coursera today to learn data science, programming, business strategy, and more.

课程评论: 1 个评论

评论课程        关注课程

课程详情

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

Lesson 1: Perfect Ciphers
What makes certain ciphers perfect, how the Lorenz Cipher was broken

Lesson 2: Symmetric Encryption
Sending messages when two people share a secret

Lesson 3: Key Exchange
Technics to establish a shared secret

Lesson 4: Asymmetric Encryption
Exchanging information using public key cryptosystems

Lesson 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerce

Lesson 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cash

Lesson 7: Secure Computation
Computing without exposing data

课程评论(1条)

1

wzyer 2013-05-22 15:42 1 票支持; 0 票反对

我很喜欢这门课。能把这样一个偏数学的主题讲的这么有趣本身就很难得,编程作业更是吸引人。记得讲RSA的单元的作业是破解十多段密文,每一段解密后的明文都是下一段的线索,环环相扣,很有意思。而且这门课难度也不低,想完全掌握还是需要很多思考的。

Deep Learning Specialization on Coursera

课程简介

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

课程标签

密码 密码学 密码学导论 应用密码学 密码学入门

13人关注该课程

主题相关的课程

Artificial Intelligence for Robotics 关注

Functional Hardware Verification 关注

Software Testing 关注

Interactive 3D Graphics 关注

Software Debugging 关注

Design of Computer Programs 关注

Differential Equations in Action 关注

Algorithms 关注

Introduction to Theoretical Computer Science 关注

HTML5 Game Development 关注