When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks, and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel. We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm, and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge, we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account.
In this module we learn the basic concepts and principles of crytography, introduce the basic concept of cryptoanalysis using mono-alphabetic substitution cipher as an example, and discuss the one-time-pad and quantum key distribution concepts.
What's included
6 videos6 readings1 assignment1 discussion prompt
Show info about module content
6 videos•Total 50 minutes
Course Overview•3 minutes
Basic Cryptography•10 minutes
Kerckhoff's Principle•9 minutes
CryptoAnalysis of Monoalphabetic Substitution Cipher•13 minutes
Columnar Transposition Ciphers•4 minutes
One-Time Pad & Quantum Key Distribution•10 minutes
6 readings•Total 155 minutes
Get help and meet other learners. Join your Community!•5 minutes
Introduction to cryptology, from PGP Corporation•30 minutes
What makes a cryptographic protocol strong?•30 minutes
Basic Cryptoanalysis. Three Basic Variations of Cryptoanalysis or Cipher Attack:•30 minutes
Columnar transposition Ciphers•30 minutes
One time pad encryption•30 minutes
1 assignment•Total 30 minutes
Exam 2.1•30 minutes
1 discussion prompt•Total 10 minutes
Discussion Topic•10 minutes
Symmetric Key Cryptography
Module 2•6 hours to complete
Module details
In this module we present the basic mechanism of symmetric key crytography algorithms, discuss the DES and AES standard, describe the criteria for selecting AES standard, present the block cipher operating modes and discuss how the block swapping attacks and replay attacks can be prevented and detected.
What's included
6 videos5 readings1 assignment1 peer review
Show info about module content
6 videos•Total 55 minutes
Symmetric Key Algorithm•9 minutes
Advanced Encryption Standard•9 minutes
AES Expansion/Schedule•5 minutes
AES Selection Criteria•13 minutes
Dealing with Block Swapping and Replay Attacks•8 minutes
Block Cipher Mode of Operation•11 minutes
5 readings•Total 180 minutes
Symmetric Key Encryption and DES•15 minutes
AES: The Advanced Encryption Standard by Avi Kak•120 minutes
Section 8.8 Key Expansion Algorithm from Prof. Section 8.8 Key Expansion Algorithm Lecture Note•15 minutes
Report on the Development of the Advanced Encryption Standard (AES)•15 minutes
Block cipher mode of operation•15 minutes
1 assignment•Total 20 minutes
Exam 2.2. Symmetric Key Algorithm•20 minutes
1 peer review•Total 120 minutes
Project 2a. Using OpenSSL to encrypt/decrypt data•120 minutes
Asymmetric Key Cryptography
Module 3•5 hours to complete
Module details
In this module we will learn the modular arithmetic, the Euler Totient Theorm, the RSA Asymmetric Crypto Algorithm, use OpenSSL to realize the basic operations of RSA Crypto Algorithm, and Diffie-Hellman Symmetric Key Exchange Protocol to derive session keys.
Project 2b. Decipher the message encrypted with shared key established by the Diffie-Hellman Key Exchange Protocol•120 minutes
Develop Secure Programs with Crypto API
Module 4•2 hours to complete
Module details
In this module, we learn how to use Crypto API to write secure programs for encrypting and decrypting documents, and for signing and verify documents. We then apply the techniques to enhance the registration process of a web site which ensures the account created is actually belonging to the owner of the email account the request profile.
What's included
3 videos3 readings1 assignment
Show info about module content
3 videos•Total 45 minutes
Use Crypto API to Encrypt and Decrypt•15 minutes
Use Crypto API to Sign and Verify•10 minutes
Mini Capstone: Enhance Registration Web Site Security•20 minutes
3 readings•Total 70 minutes
PHP encrypt and decrypt crypto api•20 minutes
PHP Openssl sign and verify API•20 minutes
Ashley Madison Case•30 minutes
1 assignment•Total 30 minutes
Exam 2.4. Develop Secure Programs with Crypto API•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.